Extracting prog: 6m54.734566601s Minimizing prog: 1h50m56.292206541s Simplifying prog options: 0s Extracting C: 8m49.107559885s Simplifying C: 59m2.204179102s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD-openat$cgroup_root-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="02"], 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD-openat$cgroup_root-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005345c0f63cdc2e82818254950ee03568b8809a1f04c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab66c1aae9314d7381fcfeb970bea672010000000000000043144648a07a975bd89dc398712376610faa54f12495b4659be8673086f6f3543205d4bc4ce05b8b961103673dff7f158052e62bfbdcddde6985f3f1ac5d9a94cc53207899762a07282a1914452d11858e795a3ca30a101af5574f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5ed44039aab46419496362e54cfad05b4004ac71a003d7b85d07191bed4e5a8908263722d4146f7ed569985439baa355cf3d8731f5e7a237bc06d035a8d601f21746d880819f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c5b9f87d988c9fbd2b9d9b4e2d71753b1549fa734f0b2e5fcf9549804cddad721971637f9c9730a9cc384eed30345979db9c93e1c52f42cad0a4d4f9436d3f39b0ed09c395dc6e970366087a8e4daeeb1b017006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f710c490ecd085d2811a7555c53030000007f00000000bfa6478eb96b079c277e2910b7ccdc3d672ed34aa65278c549e2abb549ad954884289130bc71cee2b7de62bf48129ae1af052a2d46a6165eb0954dac7265f1f425735acf6377793946b3229e861d8ea49806b3b533345d36ecef9df700000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c000000aaae37f044bcadeb0f6846582b7653665aa336db9f0384d3c7ddf79c2e0000000000000000000000000000000000000000000000e154aa0d3e41986a668ee1e5ef93a8ceac75f44aae95e26742f895f287111f8ee86f7e3ffb63cfb0e345cf7fc63dd2b0d30977899c6f03640040af4db71f7452bfc79a05118d8bb42b63b195771e42f9942ec626bd4b5461b74324012164e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="02"], 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD-openat$cgroup_root detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005345c0f63cdc2e82818254950ee03568b8809a1f04c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab66c1aae9314d7381fcfeb970bea672010000000000000043144648a07a975bd89dc398712376610faa54f12495b4659be8673086f6f3543205d4bc4ce05b8b961103673dff7f158052e62bfbdcddde6985f3f1ac5d9a94cc53207899762a07282a1914452d11858e795a3ca30a101af5574f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5ed44039aab46419496362e54cfad05b4004ac71a003d7b85d07191bed4e5a8908263722d4146f7ed569985439baa355cf3d8731f5e7a237bc06d035a8d601f21746d880819f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c5b9f87d988c9fbd2b9d9b4e2d71753b1549fa734f0b2e5fcf9549804cddad721971637f9c9730a9cc384eed30345979db9c93e1c52f42cad0a4d4f9436d3f39b0ed09c395dc6e970366087a8e4daeeb1b017006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f710c490ecd085d2811a7555c53030000007f00000000bfa6478eb96b079c277e2910b7ccdc3d672ed34aa65278c549e2abb549ad954884289130bc71cee2b7de62bf48129ae1af052a2d46a6165eb0954dac7265f1f425735acf6377793946b3229e861d8ea49806b3b533345d36ecef9df700000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c000000aaae37f044bcadeb0f6846582b7653665aa336db9f0384d3c7ddf79c2e0000000000000000000000000000000000000000000000e154aa0d3e41986a668ee1e5ef93a8ceac75f44aae95e26742f895f287111f8ee86f7e3ffb63cfb0e345cf7fc63dd2b0d30977899c6f03640040af4db71f7452bfc79a05118d8bb42b63b195771e42f9942ec626bd4b5461b74324012164e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h5m42.33854629s repro crashed as (corrupted=false): INFO: task kworker/1:1:51 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:51 tgid:51 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df931d84 r8:00000002 r7:60000113 r6:df931d8c r5:833dec00 r4:833dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df931e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84beb78c r4:84beb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84beb78c r4:832a0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833dec00 r8:832a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0100 r8:80287e08 r7:df879e60 r6:83378280 r5:833dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf931fb0 to 0xdf931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832a1200 INFO: task kworker/1:1:51 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: af58f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:2:719 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:719 tgid:719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0455d84 r8:00000002 r7:60000113 r6:e0455d8c r5:83b38c00 r4:83b38c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b38c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f18b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9638c r4:85d96000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d9638c r4:83d28b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b38c00 r8:83d28b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83d28b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83d28b00 r8:80287e08 r7:df879e60 r6:83d28b80 r5:83b38c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0455fb0 to 0xe0455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d2a200 INFO: task kworker/1:2:719 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: afc2d000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:3:2887 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:2887 tgid:2887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebca9d84 r8:00000002 r7:60000113 r6:ebca9d8c r5:83b45400 r4:83b45400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b45400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b45400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a59b8c r4:85a59800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a59b8c r4:845d9b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b45400 r8:845d9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:845d9b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9b80 r8:80287e08 r7:df845e60 r6:845d9b00 r5:83b45400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845d7600 INFO: task kworker/0:3:2887 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: afc2d000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:0:3095 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3095 tgid:3095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec761d84 r8:00000002 r7:60000113 r6:ec761d8c r5:83ab0c00 r4:83ab0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ab0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec761e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a3a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0125000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bea38c r4:84bea000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bea38c r4:84a24800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ab0c00 r8:84a2482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24800 r8:80287e08 r7:df931e60 r6:83cc8a80 r5:83ab0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec761fb0 to 0xec761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2f400 INFO: task kworker/1:0:3095 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: aff80000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:4:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83a9ec00 r4:83a9ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0f8c r4:84be0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be0f8c r4:84a0f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9ec00 r8:84a0f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a0f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a0f000 r8:80287e08 r7:df975e60 r6:83348880 r5:83a9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a39a40 INFO: task kworker/0:4:3119 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b06ee000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:5:3120 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000013 r6:df9d9d8c r5:83a98c00 r4:83a98c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a98c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df883000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac5f8c r4:84ac5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac5f8c r4:83348800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a98c00 r8:8334882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83348800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83348800 r8:80287e08 r7:df9d5e60 r6:845d6e00 r5:83a98c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a39a40 INFO: task kworker/0:5:3120 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0c2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:6:3122 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:83a9c800 r4:83a9c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a4b8c r4:852a4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a4b8c r4:84a2c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9c800 r8:84a2c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c000 r8:80287e08 r7:df9d9e60 r6:84a2c080 r5:83a9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a39a40 INFO: task kworker/0:6:3122 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0c2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:3:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000013 r6:df9c1d8c r5:84476000 r4:84476000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84476000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e3ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84476000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df885000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84beab8c r4:84bea800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84beab8c r4:84a24380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84476000 r8:84a243ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24380 r8:80287e08 r7:df931e60 r6:84a24a80 r5:84476000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791640 INFO: task kworker/1:3:3123 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0f18000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:7:3124 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:84471800 r4:84471800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84471800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850edbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84471800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516bb8c r4:8516b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516bb8c r4:84a2c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84471800 r8:84a2c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c100 r8:80287e08 r7:df9e1e60 r6:84a24e00 r5:84471800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a399c0 INFO: task kworker/0:7:3124 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0f18000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:4:3127 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:84474800 r4:84474800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84474800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84808d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84474800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bebb8c r4:84beb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bebb8c r4:84a24780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84474800 r8:84a247ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24780 r8:80287e08 r7:df931e60 r6:84a24c00 r5:84474800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847919c0 INFO: task kworker/1:4:3127 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b11ed000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3129 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:84470000 r4:84470000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84470000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f87c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84470000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9aa000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518c78c r4:8518c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518c78c r4:84a24d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84470000 r8:84a24d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24d00 r8:80287e08 r7:df931e60 r6:84a24980 r5:84470000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791c40 INFO: task kworker/1:5:3129 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b11ed000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3131 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83242400 r4:83242400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516038c r4:85160000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516038c r4:84a24b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:84a24bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24b80 r8:80287e08 r7:df9f9e60 r6:84a24480 r5:83242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847919c0 INFO: task kworker/1:6:3131 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1336000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3133 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000013 r6:dfa11d8c r5:83244800 r4:83244800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85254440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae23000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527db8c r4:8527d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527db8c r4:84a24b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:84a24b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24b00 r8:80287e08 r7:df9f9e60 r6:84a24c80 r5:83244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791dc0 INFO: task kworker/1:7:3133 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b176e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3136 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83a90000 r4:83a90000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a90000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564b4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552db8c r4:8552d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552db8c r4:83366b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a90000 r8:83366b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83366b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83366b00 r8:80287e08 r7:dfa11e60 r6:83366a80 r5:83a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791f80 INFO: task kworker/1:8:3136 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1a6e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3137 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa45d84 r8:00000002 r7:60000013 r6:dfa45d8c r5:83a91800 r4:83a91800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a91800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a91800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0463000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a478c r4:852a4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a478c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a91800 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfa31e60 r6:830b8400 r5:83a91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791dc0 INFO: task kworker/1:9:3137 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1a6e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3139 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83a90c00 r4:83a90c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a90c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e6580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a238c r4:853a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a238c r4:84a2c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a90c00 r8:84a2c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c180 r8:80287e08 r7:df9e1e60 r6:830cc100 r5:83a90c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f240 INFO: task kworker/0:8:3139 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1b98000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3141 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:83a93c00 r4:83a93c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a93c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0013000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85305f8c r4:85305c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85305f8c r4:830cc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a93c00 r8:830cc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc400 r8:80287e08 r7:dfa31e60 r6:830cc080 r5:83a93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791140 INFO: task kworker/1:10:3141 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1b98000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:8389d400 r4:8389d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478f280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8389d400 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b8b8c r4:853b8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b8b8c r4:84a2c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389d400 r8:84a2c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c200 r8:80287e08 r7:dfa49e60 r6:830cc380 r5:8389d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f440 INFO: task kworker/0:9:3142 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b224e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3145 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:832e1800 r4:832e1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832e1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fbe80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb307000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fbb8c r4:854fb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854fbb8c r4:84a2c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832e1800 r8:84a2c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c280 r8:80287e08 r7:dfa61e60 r6:83f79280 r5:832e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f4c0 INFO: task kworker/0:10:3145 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2572000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3147 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:838be000 r4:838be000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838be000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838be000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550878c r4:85508400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550878c r4:83f79200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838be000 r8:83f7922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83f79200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83f79200 r8:80287e08 r7:dfa31e60 r6:84314c80 r5:838be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:846203c0 INFO: task kworker/1:11:3147 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2572000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3149 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:8389e000 r4:8389e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8389e000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85886b8c r4:85886800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85886b8c r4:84a2c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389e000 r8:84a2c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c300 r8:80287e08 r7:dfa71e60 r6:83cda000 r5:8389e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f680 INFO: task kworker/0:11:3149 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2a8e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3150 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:838bb000 r4:838bb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838bb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb633000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85516b8c r4:85516800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85516b8c r4:84a2c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bb000 r8:84a2c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c380 r8:80287e08 r7:dfa8de60 r6:83cda080 r5:838bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f680 INFO: task kworker/0:12:3150 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2a8e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3152 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000013 r6:dfaa5d8c r5:840ad400 r4:840ad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840ad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85590880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85517b8c r4:85517800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85517b8c r4:83cda100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840ad400 r8:83cda12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda100 r8:80287e08 r7:dfa31e60 r6:83cda180 r5:840ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620580 INFO: task kworker/1:12:3152 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2f96000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3154 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:840abc00 r4:840abc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840abc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580d940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb467000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85885f8c r4:85885c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85885f8c r4:84a2c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840abc00 r8:84a2c42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c400 r8:80287e08 r7:dfa8de60 r6:83cda200 r5:840abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f840 INFO: task kworker/0:13:3154 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b366e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:840a8000 r4:840a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562c480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552d38c r4:8552d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552d38c r4:83cda280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840a8000 r8:83cda2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda280 r8:80287e08 r7:dfa31e60 r6:83cda300 r5:840a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620880 INFO: task kworker/1:13:3156 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b366e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3159 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83a86000 r4:83a86000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a86000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857148c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb485000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552e38c r4:8552e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552e38c r4:83cda380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a86000 r8:83cda3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda380 r8:80287e08 r7:dfa31e60 r6:83cda400 r5:83a86000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620e00 INFO: task kworker/1:14:3159 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b3c01000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83a84800 r4:83a84800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a84800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579178c r4:85791400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579178c r4:83cda480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a84800 r8:83cda4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda480 r8:80287e08 r7:dfab1e60 r6:83cda500 r5:83a84800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620fc0 INFO: task kworker/1:15:3162 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b3c01000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3164 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83a81800 r4:83a81800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a81800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479cd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471e38c r4:8471e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471e38c r4:83cda580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a81800 r8:83cda5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda580 r8:80287e08 r7:dfa5de60 r6:83cda600 r5:83a81800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35040 INFO: task kworker/1:16:3164 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b4153000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3165 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df98dd84 r8:00000002 r7:60000013 r6:df98dd8c r5:83a85400 r4:83a85400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a85400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552f38c r4:8552f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552f38c r4:83cda680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a85400 r8:83cda6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda680 r8:80287e08 r7:dfae1e60 r6:83cda700 r5:83a85400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35040 INFO: task kworker/1:17:3165 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b46e7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3167 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000013 r6:dfaedd8c r5:844a0000 r4:844a0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4869000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471e78c r4:8471e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471e78c r4:83cda780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0000 r8:83cda7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda780 r8:80287e08 r7:dfae1e60 r6:83cda800 r5:844a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35200 INFO: task kworker/1:18:3167 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b4924000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3169 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:844a0c00 r4:844a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbd740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d0f8c r4:858d0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d0f8c r4:83cda880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0c00 r8:83cda8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda880 r8:80287e08 r7:dfaede60 r6:83cda900 r5:844a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35340 INFO: task kworker/1:19:3169 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b4d59000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3170 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:844a6000 r4:844a6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a35c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85956b8c r4:85956800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85956b8c r4:83cda980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6000 r8:83cda9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda980 r8:80287e08 r7:dfaf9e60 r6:83cdaa00 r5:844a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35340 INFO: task kworker/1:20:3170 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b51c7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3172 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:83236000 r4:83236000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c97c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595678c r4:85956400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595678c r4:83cdaa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:83cdaaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdaa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdaa80 r8:80287e08 r7:dfb11e60 r6:83cdab00 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35440 INFO: task kworker/1:21:3172 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b530f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:83b41800 r4:83b41800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b41800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b41800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5978c r4:85a59400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5978c r4:84a2c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b41800 r8:84a2c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c480 r8:80287e08 r7:dfa8de60 r6:83cdab80 r5:83b41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478fe80 INFO: task kworker/0:14:3175 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5720000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3178 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83b46000 r4:83b46000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b46000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84807d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b46000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85956f8c r4:85956c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85956f8c r4:83cdac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b46000 r8:83cdac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdac00 r8:80287e08 r7:dfb11e60 r6:83cdac80 r5:83b46000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35b40 INFO: task kworker/1:22:3178 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5bdd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3180 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000013 r6:dfb21d8c r5:83b43c00 r4:83b43c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b43c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0451000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adc78c r4:85adc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adc78c r4:83cdad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b43c00 r8:83cdad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdad00 r8:80287e08 r7:dfb2de60 r6:83cdad80 r5:83b43c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35bc0 INFO: task kworker/1:23:3180 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5bdd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83b40000 r4:83b40000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b40000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7cb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b40000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecebb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85957b8c r4:85957800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85957b8c r4:83cdae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b40000 r8:83cdae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdae00 r8:80287e08 r7:dfb21e60 r6:83cdae80 r5:83b40000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35bc0 INFO: task kworker/1:24:3181 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5f9a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83252400 r4:83252400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83252400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83252400 r7:00000000 r6:83018200 r5:00001000 r4:7f18f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed441000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d96b8c r4:85d96800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d96b8c r4:83cdaf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:83cdaf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdaf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdaf00 r8:80287e08 r7:dfb21e60 r6:83cdaf80 r5:83252400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a44140 INFO: task kworker/1:25:3185 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b6354000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3186 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:83a9d400 r4:83a9d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a59f8c r4:85a59c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a59f8c r4:84a2c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9d400 r8:84a2c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c500 r8:80287e08 r7:dfb31e60 r6:84a2c580 r5:83a9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478fa80 INFO: task kworker/0:15:3186 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b66dd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:83a9e000 r4:83a9e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed61b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d04f8c r4:85d04c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d04f8c r4:83cc8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9e000 r8:83cc8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cc8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cc8a00 r8:80287e08 r7:dfb59e60 r6:84a2c600 r5:83a9e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a44440 INFO: task kworker/1:26:3187 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b66dd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3190 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:83a98000 r4:83a98000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a98000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:e058ddc0 r5:84be038c r4:84be0000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Workqueue: events bpf_prog_free_deferred r5:83a99800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ec40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a99800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5af8c r4:85a5ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5af8c r4:84a2c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a99800 r8:84a2c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c780 r8:80287e08 r7:dfb65e60 r6:84a2c800 r5:83a99800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844de140 INFO: task kworker/0:17:3192 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b6ccf000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe058dfb0 to 0xe058dff8) task:kworker/0:18 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ea00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5a78c r4:85a5a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a2c880 r8:80287e08 r7:dfb7de60 r6:84a2c900 r5:83a9a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r5:00001000 r4:dfb45000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8eb40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: b720b000 dfadb000 00000001 80239b98 7f2f7000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ef40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5bb8c r4:85a5b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5bb8c r4:84a2ca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833dbc00 r8:84a2caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2ca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2ca80 r8:80287e08 r7:dfb7de60 r6:84a2cb00 r5:833dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844de540 INFO: task kworker/0:20:3199 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b720b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:21 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85a5b38c r4:85a5b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a2cb80 r8:80287e08 r7:dfb99e60 r6:84a2cc00 r5:83b3a400 INFO: task kworker/0:21:3200 is blocked on a mutex likely owned by task kworker/1:201:3654. dd60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3202 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83b3c800 r4:83b3c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b3c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d9678c r4:85d96400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:22:3204 blocked for more than 451 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:83b3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 r5:85a5b78c r4:85a5b400 r4:84a2cd00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r5:00001000 r4:dfb45000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1d280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa9800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5838c r4:85b58000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5838c r4:84a2ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aa9800 r8:84a2ce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2ce00 r8:80287e08 r7:dfb99e60 r6:84a2ce80 r5:83aa9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844dea00 INFO: task kworker/0:23:3206 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b7ba9000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:84be038c r4:84be0000 r4:00000001 r4:84ba8680 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85b5878c r4:84a2cf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: b7ba9000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3210 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:84213c00 r4:84213c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84213c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1d500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecbbf000 r5:85b58b8c r4:85b58800 r10:61c88647 r9:84213c00 r8:8479902c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r5:80000113 r4:80239bb0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85b5938c r4:85b59000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5938c r4:84799100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84210000 r8:8479912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799100 r8:80287e08 r7:dfbdde60 r6:84799180 r5:84210000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84798000 INFO: task kworker/0:26:3212 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b837b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84211800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1d600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84211800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b58f8c r4:85b58c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b58f8c r4:84799200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84211800 r8:8479922c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:84bbbe80 dfa0: 00000000 00000000 00000000 00000000 r5:84216000 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85b5978c r4:85b59400 r4:84799380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Not tainted 6.15.0-rc7-syzkaller #0 r5:84a50000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85b59b8c r4:85b59800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84798340 INFO: task kworker/0:29:3218 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b89db000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3220 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84a50c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85b5a78c r4:85b5a400 r10:61c88647 r9:84a50c00 r8:8479952c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 Exception stack(0xe058dfb0 to 0xe058dff8) [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r9:83018005 r8:84a51800 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 r10:61c88647 r9:84a51800 r8:847996ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b8e4f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3224 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:84a52400 r4:84a52400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a52400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a807c0 r5:85b5a38c r4:85b5a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a52400 r8:847997ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdfc31fb0 to 0xdfc31ff8) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85ae738c r4:85ae7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84799880 Exception stack(0xdfc3dfb0 to 0xdfc3dff8) INFO: task kworker/0:33:3226 is blocked on a mutex likely owned by task kworker/1:201:3654. dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/0:34:3228 blocked for more than 451 seconds. r4:84a53c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5ab8c r4:85b5a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5ab8c r4:84799980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a53c00 r8:847999ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799980 r8:80287e08 r7:dfc3de60 r6:84799a00 r5:84a53c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84798b00 INFO: task kworker/0:34:3228 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b933f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3230 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:84a54800 r4:84a54800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a54800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a80500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a54800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5af8c r4:85b5ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5af8c r4:84799a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a54800 r8:84799aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799a80 r8:80287e08 r7:dfc49e60 r6:84799b00 r5:84a54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b962b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85b5b38c r4:85b5b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5b38c r4:84799b80 r10:61c88647 r9:84a55400 r8:84799bac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r4:00000000 r5:84be038c r4:84be0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84a56000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 r5:85b5b78c r4:85b5b400 r7:dddced80 r6:83018000 r5:85b5b78c r4:84799c80 r10:00000000 r9:84799c80 r8:80287e08 r7:dfc61e60 r6:84799d00 r5:84a56000 INFO: task kworker/0:37:3235 is blocked on a mutex likely owned by task kworker/1:201:3654. Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b9d13000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3236 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84a56c00 r4:84a56c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a56c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5bb8c r4:85b5b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5bb8c r4:84799d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a56c00 r8:84799dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799d80 r8:80287e08 r7:dfc6de60 r6:84799e00 r5:84a56c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af240 INFO: task kworker/0:38:3236 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b6838c r4:84799e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843f0000 r8:84799eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799e80 r8:80287e08 r7:dfc79e60 r6:84799f00 r5:843f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af340 INFO: task kworker/0:39:3239 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ba085000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3240 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc91d84 r8:00000002 r7:60000113 r6:dfc91d8c r5:843f0c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63b40 r5:85b6878c r4:85b68400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: ba085000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:843f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 r5:85b68b8c r4:85b68800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3244 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84469800 r4:84469800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84469800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84469800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b68f8c r4:85b68c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b68f8c r4:847b4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84469800 r8:847b41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4180 r8:80287e08 r7:dfc9de60 r6:8478e080 r5:84469800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af640 INFO: task kworker/0:42:3244 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ba637000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:843f2400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: ba7c2000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r5:84be038c r4:84be0000 r4:84bbbe80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:843f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b6978c r4:85b69400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b6978c r4:847b4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843f3000 r8:847b432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4300 r8:80287e08 r7:dfcb5e60 r6:847b4380 r5:843f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af880 INFO: task kworker/0:44:3248 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ba7c2000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3251 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd1d84 r8:00000002 r7:60000013 r6:dfcd1d8c r5:843f3c00 r4:843f3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843f3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847b4400 r8:80287e08 r7:dfcc5e60 r6:847b4480 r5:843f3c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: bab6d000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85b69b8c r4:85b69800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847b4500 r8:80287e08 r7:dfcd1e60 r6:8478e100 r5:84468c00 INFO: task kworker/0:46:3252 is blocked on a mutex likely owned by task kworker/1:201:3654. Exception stack(0xe058dd28 to 0xe058dd70) r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3254 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:84468000 r4:84468000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84468000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84468000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed145000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b69f8c r4:85b69c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b69f8c r4:847b4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84468000 r8:847b45ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4580 r8:80287e08 r7:dfcf5e60 r6:8478e180 r5:84468000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847afb80 INFO: task kworker/0:47:3254 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bb08c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r4:e058ddc0 r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8446c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8446c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ff00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed107000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1578c r4:85c15400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c1578c r4:847b4680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8446c800 r8:847b46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4680 r8:80287e08 r7:dfd15e60 r6:8478e280 r5:8446c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847afec0 INFO: task kworker/0:49:3258 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bb10c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85b6a78c r4:85b6a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfd29fb0 to 0xdfd29ff8) INFO: task kworker/0:50:3260 is blocked on a mutex likely owned by task kworker/1:201:3654. Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r4:00000000 r5:84be038c r4:84be0000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c14f8c r4:85c14c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c14f8c r4:847b4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8446d400 r8:847b47ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4780 r8:80287e08 r7:dfd1de60 r6:8478e380 r5:8446d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd35fb0 to 0xdfd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847c8100 INFO: task kworker/0:51:3261 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bba94000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3268 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8446e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85d9738c r4:8478e400 r10:00000000 r9:8478e400 r8:80287e08 r7:dfb59e60 r6:8478e480 r5:8446e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfce9d84 r8:00000002 r7:60000013 r6:dfce9d8c r5:8446ec00 r4:8446ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8446ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8446ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f19b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed84d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d97f8c r4:85d97c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d97f8c r4:8478e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8446ec00 r8:8478e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e500 r8:80287e08 r7:dfd41e60 r6:8478e580 r5:8446ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847b5a40 INFO: task kworker/1:29:3270 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bc133000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Not tainted 6.15.0-rc7-syzkaller #0 r4:8446a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9bde08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85e0c38c r4:85e0c000 r10:61c88647 r9:8446a400 r8:8478e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3272 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000013 r6:df9f5d8c r5:838ae000 r4:838ae000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838ae000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858313c0 r5:85c1638c r4:85c16000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847c85c0 INFO: task kworker/0:52:3272 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bc74a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3276 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3276 tgid:3276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa01d84 r8:00000002 r7:60000013 r6:dfa01d8c r5:84238000 r4:84238000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d97b8c r4:85d97800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8478e880 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84238c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 r5:85b6af8c r4:85b6ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847b4900 r8:80287e08 r7:df9d1e60 r6:8478ea00 r5:84238c00 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3280 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa2dd84 r8:00000002 r7:60000013 r6:dfa2dd8c r5:84239800 r4:84239800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84239800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84239800 r7:00000000 r6:83018200 r5:00001000 r4:7f195000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9778c r4:85d97400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d9778c r4:8478e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84239800 r8:8478e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e980 r8:80287e08 r7:dfa01e60 r6:8478ea80 r5:84239800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:8423c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b6b38c r4:85b6b000 r10:61c88647 r9:8423c800 r8:847b49ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8a40 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3286 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000013 r6:dfac9d8c r5:8423e000 r4:8423e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8423e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c7340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8423e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbe3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b6bb8c r4:85b6b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b6bb8c r4:847b4a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8423e000 r8:847b4a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4a00 r8:80287e08 r7:df9d1e60 r6:8478ed80 r5:8423e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847c8b80 INFO: task kworker/0:56:3286 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bd375000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbe680 r8:80287e08 r7:e04f9e60 r6:84bbe700 r5:84af9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3628 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e051dd84 r8:00000002 r7:60000113 r6:e051dd8c r5:84afbc00 r4:84afbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84afbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baa5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84afbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac4b8c r4:84ac4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac4b8c r4:84bbe880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afbc00 r8:84bbe8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbe880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbe880 r8:80287e08 r7:e04ede60 r6:84bbe900 r5:84afbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bb9280 INFO: task kworker/0:71:3628 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bd948000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:202:3656 blocked for more than 452 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 INFO: task kworker/1:202:3656 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:84b08000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b08000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be138c r4:84be1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be138c r4:84bbbf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08000 r8:84bbbfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf80 r8:80287e08 r7:e05ade60 r6:84bc4000 r5:84b08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b5fb0 to 0xe05b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba86c0 INFO: task kworker/1:203:3658 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/1:204:3660 blocked for more than 452 seconds. r5:84b08c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:3664 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04fdd84 r8:00000002 r7:60000013 r6:e04fdd8c r5:84355400 r4:84355400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84355400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb6380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84355400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be1b8c r4:84be1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be1b8c r4:84bb2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84355400 r8:84bb20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2080 r8:80287e08 r7:e05b5e60 r6:84bb2100 r5:84355400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04fdfb0 to 0xe04fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8bc0 INFO: task kworker/1:205:3664 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:206:3665 blocked for more than 452 seconds. r4:83b58c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0541e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be178c r4:84be1400 r4:84bb2180 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0541fb0 to 0xe0541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bb6100 INFO: task kworker/1:206:3665 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: be481000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:3667 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:3667 tgid:3667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:84968c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be1f8c r4:84be1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be1f8c r4:84bb2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968c00 r8:84bb22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2280 r8:80287e08 r7:e04fde60 r6:84bb2300 r5:84968c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d5fb0 to 0xe05d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbf100 INFO: task kworker/1:207:3667 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:00001000 r4:dfb45000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:208:3669 blocked for more than 452 seconds. r5:8496a400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:3670 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:3670 tgid:3670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:84968000 r4:84968000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be238c r4:84be2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be238c r4:84bb2480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968000 r8:84bb24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2480 r8:80287e08 r7:e05d9e60 r6:84bb2500 r5:84968000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbf280 INFO: task kworker/1:209:3670 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:72:3673 blocked for more than 452 seconds. r4:8496bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:73 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8496c800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac538c r4:84ac5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac538c r4:84bc4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496c800 r8:84bc41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4180 r8:80287e08 r7:e05f9e60 r6:84bb2600 r5:8496c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84baa8c0 INFO: task kworker/0:73:3674 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bf229000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:3677 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:3677 tgid:3677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0605d84 r8:00000002 r7:60000013 r6:e0605d8c r5:8496d400 r4:8496d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfc40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be2b8c r4:84be2800 r10:61c88647 r9:8496d400 r8:84bb26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:3679 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:84969800 r4:84969800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84969800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfe40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be2f8c r4:84be2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be2f8c r4:84bb2780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84969800 r8:84bb27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2780 r8:80287e08 r7:e0605e60 r6:84bb2800 r5:84969800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbf880 INFO: task kworker/1:211:3679 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bf229000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:8496b000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84be338c r4:84be3000 r7:ddde2d80 r6:83018200 r5:84be338c r4:84bb2880 r10:00000000 r9:84bb2880 r8:80287e08 r7:e060de60 r6:84bb2900 r5:8496b000 r4:84bbf980 Exception stack(0xe058dd28 to 0xe058dd70) r4:e058ddc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:3684 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05f5d84 r8:00000002 r7:60000113 r6:e05f5d8c r5:8496ec00 r4:8496ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be378c r4:84be3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:213:3684 is blocked on a mutex likely owned by task kworker/1:201:3654. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8496e000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7380 r10:61c88647 r9:8496e000 r8:84bb2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be3b8c r4:84be3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be3b8c r4:84bb2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84356c00 r8:84bb2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2b80 r8:80287e08 r7:e0571e60 r6:84bb2c00 r5:84356c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe061dfb0 to 0xe061dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7000 INFO: task kworker/1:215:3686 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bfada000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84be838c r4:84be8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r5:84be038c r4:84be0000 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84be878c r4:84be8400 r10:61c88647 r9:84368000 r8:84bb2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7340 INFO: task kworker/1:217:3691 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bfeff000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8680 r10:8291a684 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:84368c00 r4:00000000 r5:84be8b8c r4:84be8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe058dd28 to 0xe058dd70) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:3695 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e062dd84 r8:00000002 r7:60000113 r6:e062dd8c r5:84369800 r4:84369800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84369800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84369800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:84be8f8c r4:84be8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Not tainted 6.15.0-rc7-syzkaller #0 r5:8436a400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436a400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be938c r4:84be9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be938c r4:84bc9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436a400 r8:84bc90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc9080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9080 r8:80287e08 r7:e062de60 r6:84bc9100 r5:8436a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7800 INFO: task kworker/1:220:3697 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c08fc000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8436bc00 r5:8436bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baa380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0131000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be9b8c r4:84be9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be9b8c r4:84bc9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436bc00 r8:84bc91ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9180 r8:80287e08 r7:e0631e60 r6:84bc9200 r5:8436bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7940 INFO: task kworker/1:221:3699 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b0a400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df961000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac638c r4:84ac6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac638c r4:84bc4200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0a400 r8:84bc422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4200 r8:80287e08 r7:e05f9e60 r6:84bc4280 r5:84b0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7480 INFO: task kworker/0:74:3702 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c0d2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3703 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3703 tgid:3703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:84b0b000 r4:84b0b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc77c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0123000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac5b8c r4:84ac5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac5b8c r4:84bc4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0b000 r8:84bc432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4300 r8:80287e08 r7:e0611e60 r6:84bc4380 r5:84b0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7480 INFO: task kworker/0:75:3703 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c0d2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:222:3705 blocked for more than 452 seconds. r4:8436d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be978c r4:84bc9280 r10:00000000 r9:84bc9280 r8:80287e08 r7:e0635e60 r6:84bc9300 r5:8436d400 INFO: task kworker/1:222:3705 is blocked on a mutex likely owned by task kworker/1:201:3654. dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:76 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:84b0bc00 r4:84b0bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac678c r4:84ac6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac678c r4:84bc4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0bc00 r8:84bc442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4400 r8:80287e08 r7:e0611e60 r6:84bc4480 r5:84b0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7640 INFO: task kworker/0:76:3707 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c0f88000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7e80 r5:84ac6f8c r4:84ac6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac6f8c r4:84bc4500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0c800 r8:84bc452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4500 r8:80287e08 r7:e063de60 r6:84bc4580 r5:84b0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc78c0 INFO: task kworker/0:77:3712 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c1931000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b0d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ac6b8c r4:84ac6800 r10:61c88647 r9:84b0d400 r8:84bc462c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c1931000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:3715 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84b0e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0441e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84713b8c r4:84713800 r7:ddde2d80 r6:83018200 r5:84713b8c r4:84bc9380 r10:00000000 r9:84bc9380 r8:80287e08 r7:e0635e60 r6:84bc4700 r5:84b0e000 INFO: task kworker/1:223:3715 is blocked on a mutex likely owned by task kworker/1:201:3654. Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c5d84 r8:00000002 r7:60000113 r6:e04c5d8c r5:8436e000 r4:8436e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8436e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e2d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0759000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be9f8c r4:84be9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be9f8c r4:84bc9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436e000 r8:84bc942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc9400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9400 r8:80287e08 r7:e0441e60 r6:84bc9480 r5:8436e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c5fb0 to 0xe04c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba9040 INFO: task kworker/1:224:3717 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c20cb000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e0499d84 r8:00000002 r7:60000113 r6:e0499d8c r5:84b0ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0499e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ac738c r4:84ac7000 r7:dddced80 r6:83018000 r5:84ac738c r4:84bc4780 r10:61c88647 r9:84b0ec00 r8:84bc47ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c20cb000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d <> t_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4c38c r4:85a4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4c38c r4:85a89700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85206c00 r8:85a8972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89700 r8:80287e08 r7:ece61e60 r6:85a89780 r5:85206c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8f2c0 INFO: task kworker/0:1003:6359 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c1a2c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85aa8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r7:dddced80 r6:83018000 r5:85a4cb8c r4:85a89800 r10:61c88647 r9:85aa8000 r8:85a8982c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:6363 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:6363 tgid:6363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece59d84 r8:00000002 r7:60000013 r6:ece59d8c r5:85aa8c00 r4:85aa8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa8c00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8f8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4c78c r4:85a4c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4c78c r4:85a89900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa8c00 r8:85a8992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89900 r8:80287e08 r7:ece69e60 r6:85a89980 r5:85aa8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece59fb0 to 0xece59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:1006:6364 blocked for more than 476 seconds. r4:85aaa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r9:83018005 r8:85aaa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 r7:dddced80 r6:83018000 r5:85a4cf8c r4:85a89a00 r10:61c88647 r9:85aaa400 r8:85a89a2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:6368 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:6368 tgid:6368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece79d84 r8:00000002 r7:60000013 r6:ece79d8c r5:85aabc00 r4:85aabc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aabc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85aabc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4db8c r4:85a4d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4db8c r4:85a89b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aabc00 r8:85a89b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89b00 r8:80287e08 r7:ece6de60 r6:85a89b80 r5:85aabc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece79fb0 to 0xece79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8fc00 INFO: task kworker/0:1007:6368 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c23d4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:00001000 r4:dfd53000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:605 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85aab000 r8:857f6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0013 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1008:6371 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1008 state:D stack:0 pid:6371 tgid:6371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece89d84 r8:00000002 r7:60000013 r6:ece89d8c r5:85aad400 r4:85aad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a4d38c r4:85a89c80 r4:85a89c80 r10:00000000 r9:85a89c80 r8:80287e08 r7:ece79e60 r6:85a89d00 r5:85aad400 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a4d78c r4:85a89d80 r4:85a89d80 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:1010 state:D stack:0 pid:6375 tgid:6375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecea1d84 r8:00000002 r7:60000013 r6:ecea1d8c r5:85aa9800 r4:85aa9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85aa9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4df8c r4:85a4dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4df8c r4:85a89e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa9800 r8:85a89eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89e80 r8:80287e08 r7:ece79e60 r6:85a89f00 r5:85aa9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea1fb0 to 0xecea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a98280 INFO: task kworker/0:1010:6375 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c2a1e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1011:6377 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1011 state:D stack:0 pid:6377 tgid:6377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceadd84 r8:00000002 r7:60000013 r6:eceadd8c r5:84a58000 r4:84a58000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a58000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98fc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4eb8c r4:85a89f80 r4:85a89f80 dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1012:6378 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1012 state:D stack:0 pid:6378 tgid:6378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece75d84 r8:00000002 r7:60000013 r6:ece75d8c r5:84a58c00 r4:84a58c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a58c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4e38c r4:85a4e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4e38c r4:85a97080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a58c00 r8:85a970ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97080 r8:80287e08 r7:eceade60 r6:85a97100 r5:84a58c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece75fb0 to 0xece75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a98540 INFO: task kworker/0:1012:6378 is blocked on a mutex likely owned by task kworker/1:204:3660. r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:1013:6381 blocked for more than 477 seconds. r4:84a5b000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a4e78c r4:85a4e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a97180 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: c3122000 dfb47000 00000001 80239b98 7f2fb000 00000001 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:6384 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:6384 tgid:6384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced5d84 r8:00000002 r7:60000013 r6:eced5d8c r5:84a59800 r4:84a59800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a59800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a59800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adcf8c r4:85adcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcf8c r4:857f6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a59800 r8:857f6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6e80 r8:80287e08 r7:ec955e60 r6:85a97280 r5:84a59800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced5fb0 to 0xeced5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7ccc0 INFO: task kworker/1:606:6384 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c3548000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:6385 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:6385 tgid:6385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced9d84 r8:00000002 r7:60000113 r6:eced9d8c r5:84a5c800 r4:84a5c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a35e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a5c800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471f78c r4:8471f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471f78c r4:857f6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5c800 r8:857f6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6f00 r8:80287e08 r7:eced5e60 r6:85a97300 r5:84a5c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7ccc0 INFO: task kworker/1:607:6385 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c3548000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1014:6388 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1014 state:D stack:0 pid:6388 tgid:6388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceddd84 r8:00000002 r7:60000113 r6:eceddd8c r5:84a5bc00 r4:84a5bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecedde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4f38c r4:85a97380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5bc00 r8:85a973ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97380 r8:80287e08 r7:eceade60 r6:85a97400 r5:84a5bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a98d00 INFO: task kworker/0:1014:6388 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84a5e000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:85a4ef8c r4:85a4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a5e000 r8:85a974ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:6392 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:6392 tgid:6392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced1d84 r8:00000002 r7:60000113 r6:eced1d8c r5:84a5a400 r4:84a5a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4fb8c r4:85a4f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4fb8c r4:85a97580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5a400 r8:85a975ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97580 r8:80287e08 r7:ecedde60 r6:85a97600 r5:84a5a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a951c0 INFO: task kworker/0:1016:6392 is blocked on a mutex likely owned by task kworker/1:204:3660. Workqueue: events bpf_prog_free_deferred 1d20: c3aee000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:00000000 r5:00001000 r4:dfd53000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a4f78c r4:85a4f400 r10:61c88647 r9:84a5ec00 r8:85a976ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:6396 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:6396 tgid:6396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece71d84 r8:00000002 r7:60000113 r6:ece71d8c r5:84a5d400 r4:84a5d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4ff8c r4:85a4fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4ff8c r4:85a97780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5d400 r8:85a977ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97780 r8:80287e08 r7:eced1e60 r6:85a97800 r5:84a5d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece71fb0 to 0xece71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a953c0 INFO: task kworker/0:1018:6396 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c3d54000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:1019:6398 blocked for more than 477 seconds. r4:85aaec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee9e08 r5:00001000 r4:ec51f000 r5:85a5838c r4:85a58000 r10:61c88647 r9:85aaec00 r8:85a978ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a58b8c r4:85a97980 r4:85a97980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97980 r8:80287e08 r7:ecee9e60 r6:85a97a00 r5:85ab8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceedfb0 to 0xeceedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a95440 INFO: task kworker/0:1020:6400 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c42ef000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1021:6402 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1021 state:D stack:0 pid:6402 tgid:6402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecef1d84 r8:00000002 r7:60000113 r6:ecef1d8c r5:85ab9800 r4:85ab9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ab9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab9800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a5878c r4:85a58400 r10:61c88647 r9:85ab9800 r8:85a97aac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1022:6403 blocked for more than 477 seconds. task:kworker/0:1022 state:D stack:0 pid:6403 tgid:6403 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef5e08 r5:00001000 r4:ec8ab000 r5:85a58f8c r4:85a58c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85abb000 r8:85a97bac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8471f38c r4:857f6f80 r10:00000000 r9:857f6f80 r8:80287e08 r7:eced5e60 r6:85a97c80 r5:85abc800 INFO: task kworker/1:608:6407 is blocked on a mutex likely owned by task kworker/1:204:3660. r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c49ec000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:6408 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:6408 tgid:6408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf09d84 r8:00000002 r7:60000113 r6:ecf09d8c r5:85abd400 r4:85abd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85abd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b152c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85abd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8471ef8c r4:8471ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85abd400 r8:85a9902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 1d20: c4d18000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf11e08 r9:83018205 r8:85abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:85adc38c r4:85adc000 r10:61c88647 r9:85abbc00 r8:85a990ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf11fb0 to 0xecf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b15140 INFO: task kworker/1:610:6411 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c4d18000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:6412 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:6412 tgid:6412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf15d84 r8:00000002 r7:60000013 r6:ecf15d8c r5:85abe000 r4:85abe000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85abe000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15f00 r5:85adcb8c r4:85adc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85abe000 r8:85a9912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:611:6412 is blocked on a mutex likely owned by task kworker/1:204:3660. Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8980 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85abec00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5938c r4:85a59000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5938c r4:85a97e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abec00 r8:85a97eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97e80 r8:80287e08 r7:ecef5e60 r6:85a97f00 r5:85abec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf19fb0 to 0xecf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8e040 INFO: task kworker/0:1023:6414 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c5146000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:6440 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:6440 tgid:6440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece85d84 r8:00000002 r7:60000113 r6:ece85d8c r5:85ac8000 r4:85ac8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a44040 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ade38c r4:85ade000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ade38c r4:85a99180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac8000 r8:85a991ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99180 r8:80287e08 r7:eced5e60 r6:85a88180 r5:85ac8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece85fb0 to 0xece85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b15c40 INFO: task kworker/1:612:6440 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:613:6441 blocked for more than 477 seconds. r4:85ac9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85add38c r4:85a99200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 r4:84ba8980 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:6443 tgid:6443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecea9d84 r8:00000002 r7:60000013 r6:ecea9d8c r5:85ac8c00 r4:85ac8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb971000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85add78c r4:85add400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add78c r4:85a99280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac8c00 r8:85a992ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99280 r8:80287e08 r7:ece85e60 r6:85a88280 r5:85ac8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b159c0 INFO: task kworker/1:614:6443 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c588b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85aca400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r9:83018205 r8:85aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a99300 r8:80287e08 r7:ece85e60 r6:85a88300 r5:85aca400 Workqueue: events bpf_prog_free_deferred 1d20: c5c68000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:6447 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:6447 tgid:6447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf41d84 r8:00000002 r7:60000113 r6:ecf41d8c r5:85a09800 r4:85a09800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a09800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a09800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85addf8c r4:85addc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85addf8c r4:85a99380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a99380 r8:80287e08 r7:ece85e60 r6:85a99400 r5:85a09800 INFO: task kworker/1:616:6447 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d20: c601d000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85a0bc00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a0bc00 r8:85a994ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85a0d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec65d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adeb8c r4:85ade800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adeb8c r4:85a99580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0d400 r8:85a995ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99580 r8:80287e08 r7:ecf45e60 r6:85a99600 r5:85a0d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c000 INFO: task kworker/1:618:6452 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c6528000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf4de08 r9:83018205 r8:85a0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a99680 r8:80287e08 r7:ecef9e60 r6:85a99700 r5:85a0e000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a0ec00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adf38c r4:85adf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adf38c r4:85a99780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0ec00 r8:85a997ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99780 r8:80287e08 r7:ecf4de60 r6:85a99800 r5:85a0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf55fb0 to 0xecf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c2c0 INFO: task kworker/1:620:6456 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c688e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:6459 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:6459 tgid:6459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf59d84 r8:00000002 r7:60000113 r6:ecf59d8c r5:85a0c800 r5:85a0c800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c7c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85a99880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:6461 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:6461 tgid:6461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf61d84 r8:00000002 r7:60000013 r6:ecf61d8c r5:85a0b000 r4:85a0b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adfb8c r4:85adf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adfb8c r4:85a99980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0b000 r8:85a999ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99980 r8:80287e08 r7:ecf59e60 r6:85a99a00 r5:85a0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf61fb0 to 0xecf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c640 INFO: task kworker/1:622:6461 is blocked on a mutex likely owned by task kworker/1:204:3660. Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:623 state:D stack:0 pid:6462 tgid:6462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf51d84 r8:00000002 r7:60000113 r6:ecf51d8c r5:85a0a400 r4:85a0a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9cb80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eca2b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a99b80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf65fb0 to 0xecf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9ca00 INFO: task kworker/1:624:6464 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c7130000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:6467 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:6467 tgid:6467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf69d84 r8:00000002 r7:60000013 r6:ecf69d8c r5:859e6c00 r4:859e6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae478c r4:85ae4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:626:6468 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:6468 tgid:6468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf6dd84 r8:00000002 r7:60000013 r6:ecf6dd8c r5:85940000 r4:85940000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85940000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9cdc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85940000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae438c r4:85ae4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae438c r4:85a99d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85940000 r8:85a99dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99d80 r8:80287e08 r7:ecf69e60 r6:85a99e00 r5:85940000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf6dfb0 to 0xecf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9cc40 INFO: task kworker/1:626:6468 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c7738000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:627:6471 blocked for more than 477 seconds. r5:85940c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf71e08 r9:83018205 r8:85940c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a99e80 r8:80287e08 r7:ecf69e60 r6:85a99f00 r5:85940c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:628:6472 blocked for more than 477 seconds. r4:85941800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8eec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85941800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae4b8c r4:85ae4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae4b8c r4:85a99f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85941800 r8:85a99fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99f80 r8:80287e08 r7:ecf71e60 r6:85a78000 r5:85941800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf79fb0 to 0xecf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1d940 INFO: task kworker/1:628:6472 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c78ed000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:629:6474 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:629 state:D stack:0 pid:6474 tgid:6474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf75d84 r8:00000002 r7:60000013 r6:ecf75d8c r5:85942400 r4:85942400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85942400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1df80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85942400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a78080 r8:80287e08 r7:ecf71e60 r6:85a78100 r5:85942400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c7b9b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:6476 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf7dd84 r8:00000002 r7:60000013 r6:ecf7dd8c r5:85943000 r4:85943000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85943000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6d140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85943000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae538c r4:85ae5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85943c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6d300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85943c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae578c r4:85ae5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae578c r4:85a78280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85943c00 r8:85a782ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78280 r8:80287e08 r7:ecf71e60 r6:85a78300 r5:85943c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf81fb0 to 0xecf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6d180 INFO: task kworker/1:631:6479 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8128000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf89d84 r8:00000002 r7:60000113 r6:ecf89d8c r5:85945400 r4:85945400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85945400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6d680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85945400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae5f8c r4:85ae5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae5f8c r4:85a78480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85945400 r8:85a784ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78480 r8:80287e08 r7:ecf71e60 r6:85a78500 r5:85945400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6d500 INFO: task kworker/1:633:6481 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8415000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6db00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae638c r4:85ae6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: c8415000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r7:ddde2d80 r6:83018200 r5:85ae6f8c r4:85a78680 r4:85a78680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:635:6487 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8867000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:6490 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:6490 tgid:6490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfa1d84 r8:00000002 r7:60000013 r6:ecfa1d8c r5:85b90c00 r4:85b90c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b90c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfa1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6de80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85b90c00 r8:85a787ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b93000 r8:85a788ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78880 r8:80287e08 r7:ecf99e60 r6:85a78900 r5:85b93000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfa5fb0 to 0xecfa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6df00 INFO: task kworker/1:637:6491 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8db5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:6495 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:6495 tgid:6495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf8dd84 r8:00000002 r7:60000113 r6:ecf8dd8c r5:85acc800 r4:85acc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a66540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae7b8c r4:85ae7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a78a00 r8:80287e08 r7:ecfa5e60 r6:85a88380 r5:85acc800 INFO: task kworker/1:638:6495 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:639:6497 blocked for more than 477 seconds. r4:85acb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf95e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:6499 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfbdd84 r8:00000002 r7:60000013 r6:ecfbdd8c r5:85acd400 r4:85acd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a668c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af078c r4:85af0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af078c r4:85a78b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acd400 r8:85a78b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78b00 r8:80287e08 r7:ecf95e60 r6:85a88480 r5:85acd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfbdfb0 to 0xecfbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66340 INFO: task kworker/1:640:6499 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c917b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a667c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66680 INFO: task kworker/1:641:6500 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c95fb000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:6503 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:6503 tgid:6503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfddd84 r8:00000002 r7:60000113 r6:ecfddd8c r5:85aac800 r4:85aac800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aac800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a66b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aac800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af0f8c r4:85af0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af0f8c r4:85a78c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aac800 r8:85a78c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85b98000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a66a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b98000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af0b8c r4:85af0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af0b8c r4:85a78c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b98000 r8:85a78cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78c80 r8:80287e08 r7:ecfdde60 r6:85a88600 r5:85b98000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecff5fb0 to 0xecff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66840 INFO: task kworker/1:643:6505 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c9d7c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a78d00 r8:80287e08 r7:ecfdde60 r6:85a88680 r5:85b98c00 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:645:6511 blocked for more than 477 seconds. r4:85b99800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85af178c r4:85af1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b99800 r8:85a78dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66c00 INFO: task kworker/1:645:6511 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ca40b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:6514 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed015d84 r8:00000002 r7:60000113 r6:ed015d8c r5:85b9bc00 r4:85b9bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9bc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed015e08 r9:83018205 r8:85b9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:85af1b8c r4:85af1800 r7:ddde2d80 r6:83018200 r5:85af1b8c r4:85a78e00 r4:85a78e00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:e05c1dc0 r5:00001000 r4:dfd53000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed019e08 r9:83018205 r8:85b9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:85af1f8c r4:85af1c00 r10:61c88647 r9:85b9a400 r8:85a78eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:6517 tgid:6517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed021d84 r8:00000002 r7:60000113 r6:ed021d8c r5:85b9d400 r4:85b9d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed021e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a73b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af378c r4:85af3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af378c r4:85a78f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b9d400 r8:85a78f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78f00 r8:80287e08 r7:ed019e60 r6:85a88880 r5:85b9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:6518 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:6518 tgid:6518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed025d84 r8:00000002 r7:60000113 r6:ed025d8c r5:85b9b000 r4:85b9b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a73040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af238c r4:85af2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af238c r4:85a78f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66940 INFO: task kworker/1:649:6518 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: caae5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85af278c r4:85af2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af278c r4:85a78980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b9c800 r8:85a789ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78980 r8:80287e08 r7:ed021e60 r6:85a88980 r5:85b9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed02dfb0 to 0xed02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a731c0 INFO: task kworker/1:650:6520 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: caae5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:6522 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:6522 tgid:6522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed035d84 r8:00000002 r7:60000013 r6:ed035d8c r5:85b9e000 r4:85b9e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed035e08 r9:83018205 r8:85b9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:85af2b8c r4:85af2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b9e000 r8:85a6402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed041d84 r8:00000002 r7:60000013 r6:ed041d8c r5:85b9ec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85af2f8c r4:85af2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a64080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64080 r8:80287e08 r7:ed021e60 r6:85a88a80 r5:85b9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed041fb0 to 0xed041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a732c0 INFO: task kworker/1:652:6524 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cb070000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:653:6526 blocked for more than 478 seconds. r5:85b90000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfcde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b5bf8c r4:85b5bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:654:6532 blocked for more than 478 seconds. r10:8291a684 r9:ed04dd84 r8:00000002 r7:60000013 r6:ed04dd8c r5:85b95400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec765000 r5:85af338c r4:85af3000 r10:61c88647 r9:85b95400 r8:85a6422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64200 r8:80287e08 r7:ed021e60 r6:85a64280 r5:85b95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed04dfb0 to 0xed04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a73780 INFO: task kworker/1:654:6532 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cb6e3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:6534 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:6534 tgid:6534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed051d84 r8:00000002 r7:60000113 r6:ed051d8c r5:85b96c00 r4:85b96c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b96c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85af3b8c r4:85af3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b96c00 r8:85a6432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85b92400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85af438c r4:85af4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a64400 r8:80287e08 r7:ed051e60 r6:85a64480 r5:85b92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed055fb0 to 0xed055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a73b80 INFO: task kworker/1:656:6536 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cbbef000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:6538 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:6538 tgid:6538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed059d84 r8:00000002 r7:60000013 r6:ed059d8c r5:85b93c00 r4:85b93c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b93c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85af3f8c r4:85af3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a64500 r8:80287e08 r7:ed055e60 r6:85a64580 r5:85b93c00 INFO: task kworker/1:657:6538 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:659:6545 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:6545 tgid:6545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed05dd84 r8:00000002 r7:60000013 r6:ed05dd8c r5:85acec00 r4:85acec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed05de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7e500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85acec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbcf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af4b8c r4:85af4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af4b8c r4:85a64680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acec00 r8:85a646ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64680 r8:80287e08 r7:ed03de60 r6:85a88b80 r5:85acec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed05dfb0 to 0xed05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a805c0 INFO: task kworker/1:659:6545 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cc7b2000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:848a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7e300 INFO: task kworker/1:660:6551 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cc7b2000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:6554 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:6554 tgid:6554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed075d84 r8:00000002 r7:60000113 r6:ed075d8c r5:848a0c00 r4:848a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed075e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7eac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af5b8c r4:85af5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af5b8c r4:85a64780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a64780 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed081e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7e9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af578c r4:85af5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af578c r4:85a64800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a2400 r8:85a6482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64800 r8:80287e08 r7:ed075e60 r6:85a88d00 r5:848a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed081fb0 to 0xed081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7e840 INFO: task kworker/1:662:6556 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:848a3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed08de08 r5:00001000 r4:ed011000 r5:85af5f8c r4:85af5c00 r10:61c88647 r9:848a3000 r8:85a648ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ccd87000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:6560 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:6560 tgid:6560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed091d84 r8:00000002 r7:60000013 r6:ed091d8c r5:848a3c00 r4:848a3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed091e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7edc0 r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 r5:85af638c r4:85af6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a64900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:6562 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:6562 tgid:6562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed09dd84 r8:00000002 r7:60000113 r6:ed09dd8c r5:848a4800 r4:848a4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed09de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af738c r4:85af7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af738c r4:85a64980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a4800 r8:85a649ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64980 r8:80287e08 r7:ed091e60 r6:85a88e80 r5:848a4800 r4:85a7ec40 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed099000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af678c r4:85af6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af678c r4:85a64a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a5400 r8:85a64a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64a00 r8:80287e08 r7:ed09de60 r6:85a88f00 r5:848a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a9fb0 to 0xed0a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7ed80 INFO: task kworker/1:666:6564 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848a6000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:848a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 r5:85af6b8c r4:85af6800 r10:61c88647 r9:848a6000 r8:85a64aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a80600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af6f8c r4:85af6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af6f8c r4:85a64b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad0000 r8:85a64b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64b00 r8:80287e08 r7:ed09de60 r6:85a7a000 r5:85ad0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d1fb0 to 0xed0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87000 INFO: task kworker/1:668:6569 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cda2f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecfe9d84 r8:00000002 r7:60000013 r6:ecfe9d8c r5:85b96000 r4:00000000 r4:00000000 r5:85af7b8c r4:85af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85b94800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed07de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b94800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af778c r4:85af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af778c r4:85a64c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b94800 r8:85a64cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64c80 r8:80287e08 r7:ecfe9e60 r6:85a64d00 r5:85b94800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed07dfb0 to 0xed07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87180 INFO: task kworker/1:670:6572 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cde4a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:671:6574 blocked for more than 478 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85af7f8c r4:85af7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a64d80 r8:80287e08 r7:ecfe9e60 r6:85a64e00 r5:85946000 INFO: task kworker/1:671:6574 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:6577 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:6577 tgid:6577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0e9d84 r8:00000002 r7:60000113 r6:ed0e9d8c r5:85ba0000 r4:85ba0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ba0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afc38c r4:85afc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afc38c r4:85a64e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba0000 r8:85a64eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:673:6578 blocked for more than 478 seconds. r4:85ba0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afc78c r4:85afc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afc78c r4:85a64f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba0c00 r8:85a64fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64f80 r8:80287e08 r7:ed0e9e60 r6:85a6a000 r5:85ba0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87600 INFO: task kworker/1:673:6578 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ce57b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:6580 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:6580 tgid:6580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed101d84 r8:00000002 r7:60000013 r6:ed101d8c r5:85ba1800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed109000 r5:85afcb8c r4:85afc800 r4:85a6a080 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85ba2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 r5:85afcf8c r4:85afcc00 r10:61c88647 r9:85ba2400 r8:85a6a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85ba3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed119e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed121000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afd38c r4:85afd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afd38c r4:85a6a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba3000 r8:85a6a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a280 r8:80287e08 r7:ed10de60 r6:85a6a300 r5:85ba3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed119fb0 to 0xed119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87a00 INFO: task kworker/1:676:6584 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cea70000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:677:6586 blocked for more than 478 seconds. r5:85ba3c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a44200 r5:85afdb8c r4:85afd800 r10:61c88647 r9:85ba3c00 r8:85a6a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85ba4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ba4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed131e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0f3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afd78c r4:85afd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afd78c r4:85a6a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba4800 r8:85a6a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a480 r8:80287e08 r7:ed125e60 r6:85a6a500 r5:85ba4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed131fb0 to 0xed131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87d00 INFO: task kworker/1:678:6588 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ced23000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:679:6592 blocked for more than 478 seconds. r4:85ba6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece9de08 r5:00001000 r4:eab2b000 r5:85afdf8c r4:85afdc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85ba8000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a6a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a680 r8:80287e08 r7:ece9de60 r6:85a6a700 r5:85ba8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb5fb0 to 0xeceb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aa080 INFO: task kworker/1:680:6593 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cef3f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:6596 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:6596 tgid:6596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85ba8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed155e08 r5:00001000 r4:eb89b000 r5:85afe38c r4:85afe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a6a780 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85ba9800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r5:85afeb8c r4:85afe800 r4:85a6a880 dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:6601 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:6601 tgid:6601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0cdd84 r8:00000002 r7:60000113 r6:ed0cdd8c r5:85baa400 r4:85baa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85baa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aa680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85baa400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afef8c r4:85afec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afef8c r4:85a6a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85baa400 r8:85a6a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a980 r8:80287e08 r7:ed13de60 r6:85a6aa00 r5:85baa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0cdfb0 to 0xed0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aa740 INFO: task kworker/1:683:6601 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cfa7f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec60b000 r5:85aff38c r4:85aff000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aff38c r4:85a6aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bab000 r8:85a6aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6aa80 r8:80287e08 r7:ed0cde60 r6:85a6ab00 r5:85bab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed159fb0 to 0xed159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aa600 INFO: task kworker/1:684:6603 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cfa7f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85affb8c r4:85aff800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85babc00 r8:85a6abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r9:83018205 r8:85bac800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:85aff78c r4:85aff400 r10:61c88647 r9:85bac800 r8:85a6acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847aaa00 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:6609 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:6609 tgid:6609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed165d84 r8:00000002 r7:60000113 r6:ed165d8c r5:85bad400 r4:85bad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aafc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bad400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0838c r4:85b08000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0838c r4:85a6ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bad400 r8:85a6adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6ad80 r8:80287e08 r7:ed15de60 r6:85a6ae00 r5:85bad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed165fb0 to 0xed165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aad40 INFO: task kworker/1:687:6609 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d0284000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:688:6610 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:688 state:D stack:0 pid:6610 tgid:6610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85bae000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85afff8c r4:85affc00 r7:ddde2d80 r6:83018200 r5:85afff8c r4:85a6ae80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:689:6613 blocked for more than 478 seconds. r4:85baec00 r4:00000000 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0878c r4:85b08400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0878c r4:85a6af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85baec00 r8:85a6afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6af80 r8:80287e08 r7:ed165e60 r6:8479b000 r5:85baec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aae80 INFO: task kworker/1:689:6613 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d0284000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:690:6615 blocked for more than 478 seconds. r5:85ba6000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85ba6000 r8:8479b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ed151d84 r8:00000002 r7:60000113 r6:ed151d8c r5:85ba5400 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8479b180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d06cc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:6618 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:6618 tgid:6618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed175d84 r8:00000002 r7:60000113 r6:ed175d8c r5:85bb0000 r4:85bb0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb0000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b08f8c r4:85b08c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b08f8c r4:8479b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb0000 r8:8479b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b280 r8:80287e08 r7:ed171e60 r6:8479b300 r5:85bb0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed175fb0 to 0xed175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479e440 INFO: task kworker/1:692:6618 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d06cc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:693:6621 blocked for more than 478 seconds. r4:85bb0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed179e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:694:6623 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:694 state:D stack:0 pid:6623 tgid:6623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed181d84 r8:00000002 r7:60000113 r6:ed181d8c r5:85bb1800 r4:85bb1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed181e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b09b8c r4:85b09800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b09b8c r4:8479b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb1800 r8:8479b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b480 r8:80287e08 r7:ed179e60 r6:8479b500 r5:85bb1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed181fb0 to 0xed181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479e380 INFO: task kworker/1:694:6623 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8479b580 r8:80287e08 r7:ed181e60 r6:8479b600 r5:85bb2400 r4:8479e700 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed189d84 r8:00000002 r7:60000013 r6:ed189d8c r5:85bb3000 r4:85bb3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed189e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0a38c r4:85b0a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0a38c r4:8479b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb3000 r8:8479b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b700 r8:80287e08 r7:ed185e60 r6:8479b780 r5:85bb3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed189fb0 to 0xed189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479e900 INFO: task kworker/1:696:6627 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d1a20000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d1d4f000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:698:6631 blocked for more than 478 seconds. r4:85bb4800 r5:85bb4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed191e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aaf80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0af8c r4:85b0ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0af8c r4:8479b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb4800 r8:8479b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b880 r8:80287e08 r7:ed18de60 r6:8479b900 r5:85bb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed191fb0 to 0xed191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479ebc0 INFO: task kworker/1:698:6631 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d1d4f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:699:6633 blocked for more than 478 seconds. r4:85bb5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed195e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d1e9f000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0b38c r4:85b0b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0b38c r4:8479ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb6000 r8:8479baac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479ba80 r8:80287e08 r7:ed191e60 r6:8479bb00 r5:85bb6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed17dfb0 to 0xed17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479eec0 INFO: task kworker/1:700:6634 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d1e9f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:6637 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:6637 tgid:6637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed199d84 r8:00000002 r7:60000013 r6:ed199d8c r5:85bb6c00 r4:85bb6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed199e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8479bb80 r8:80287e08 r7:ed17de60 r6:8479bc00 r5:85bb6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:702:6639 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:6639 tgid:6639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1a1d84 r8:00000002 r7:60000113 r6:ed1a1d8c r5:85bb8000 r4:85bb8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0038c r4:85c00000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0038c r4:8479bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb8000 r8:8479bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479bc80 r8:80287e08 r7:ed199e60 r6:8479bd00 r5:85bb8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a1fb0 to 0xed1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84822180 INFO: task kworker/1:702:6639 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 1d20: d2154000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed19de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:704:6642 blocked for more than 478 seconds. r5:85bb9800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a5e08 r5:00001000 r4:ecf49000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8479be80 r8:80287e08 r7:ed1a1e60 r6:8479bf00 r5:85bb9800 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d2552000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:6645 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:6645 tgid:6645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1a9d84 r8:00000002 r7:60000013 r6:ed1a9d8c r5:85bba400 r4:85bba400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bba400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0078c r4:85c00400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0078c r4:8479bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bba400 r8:8479bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85bbb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c00f8c r4:84911080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bbb000 r8:849110ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911080 r8:80287e08 r7:ed1a9e60 r6:84911100 r5:85bbb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b1fb0 to 0xed1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84822740 INFO: task kworker/1:706:6647 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d2a99000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85bbbc00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c00b8c r4:85c00800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ed1b9d84 r8:00000002 r7:60000113 r6:ed1b9d8c r5:85bbc800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bbc800 r8:849112ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d2b79000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:6653 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:6653 tgid:6653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1bdd84 r8:00000002 r7:60000013 r6:ed1bdd8c r5:85bbd400 r4:85bbd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bbd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0178c r4:85c01400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0178c r4:84911380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bbd400 r8:849113ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911380 r8:80287e08 r7:ed1b9e60 r6:84911400 r5:85bbd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1bdfb0 to 0xed1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84822b80 INFO: task kworker/1:709:6653 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d2e89000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb36d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84911480 r8:80287e08 r7:ed1bde60 r6:84911500 r5:85bbe000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d3068000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:6657 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:6657 tgid:6657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecec5d84 r8:00000002 r7:60000113 r6:ecec5d8c r5:85bbec00 r4:85bbec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bbec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833140 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c01f8c r4:84911580 r10:00000000 r9:84911580 r8:80287e08 r7:ed1c1e60 r6:84911600 r5:85bbec00 r4:84822e40 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85bc0000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bc0000 r8:849116ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0278c r4:85c02400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0278c r4:84911780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc0c00 r8:849117ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911780 r8:80287e08 r7:ed0b9e60 r6:84911800 r5:85bc0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c1fb0 to 0xed0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85833100 INFO: task kworker/1:713:6661 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d39db000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:714:6663 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:714 state:D stack:0 pid:6663 tgid:6663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed149d84 r8:00000002 r7:60000013 r6:ed149d8c r5:85bc1800 r4:85bc1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc1800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed149e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84911880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:6665 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:6665 tgid:6665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c0338c r4:84911980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc2400 r8:849119ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911980 r8:80287e08 r7:ed149e60 r6:84911a00 r5:85bc2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c5fb0 to 0xed1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85833480 INFO: task kworker/1:715:6665 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d3e56000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bc3000 r8:84911aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c9fb0 to 0xed1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85833580 INFO: task kworker/1:716:6668 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d3e56000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:717:6669 blocked for more than 479 seconds. r5:85bc4800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833a40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d20: d406d000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:6671 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:6671 tgid:6671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1d5d84 r8:00000002 r7:60000013 r6:ed1d5d8c r5:85ad2400 r4:85ad2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0c38c r4:85c0c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0c38c r4:84911c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84911c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:6673 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:6673 tgid:6673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1d1d84 r8:00000002 r7:60000113 r6:ed1d1d8c r5:85ad3000 r4:85ad3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c03b8c r4:85c03800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c03b8c r4:84911d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad3000 r8:84911d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911d00 r8:80287e08 r7:ed1d5e60 r6:85a7a100 r5:85ad3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:6676 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:6676 tgid:6676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1d9d84 r8:00000002 r7:60000113 r6:ed1d9d8c r5:85ad3c00 r4:85ad3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec911000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c03f8c r4:85c03c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84911d80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:721:6678 blocked for more than 479 seconds. r10:8291a684 r9:ed1ddd84 r8:00000002 r7:60000013 r6:ed1ddd8c r5:85ad4800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c0c78c r4:84911e00 r10:00000000 r9:84911e00 r8:80287e08 r7:ed1d5e60 r6:85a7a200 r5:85ad4800 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d4c6d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 INFO: task kworker/1:722:6680 blocked for more than 479 seconds. r5:85ad5400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0cb8c r4:85c0c800 r10:61c88647 r9:85ad5400 r8:84911eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d4c6d000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84911f00 r8:80287e08 r7:ed1e1e60 r6:85a7a300 r5:85ad6000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:6684 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:6684 tgid:6684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1e9d84 r8:00000002 r7:60000013 r6:ed1e9d8c r5:85ad6c00 r4:85ad6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0d38c r4:85c0d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0d38c r4:84911f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad6c00 r8:84911fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911f80 r8:80287e08 r7:ed1e5e60 r6:85a7a380 r5:85ad6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e9fb0 to 0xed1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858200c0 INFO: task kworker/1:724:6684 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d5000000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85ad1800 r4:8291a680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0d78c r4:85c0d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0d78c r4:8581e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad1800 r8:8581e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e000 r8:80287e08 r7:ed1e9e60 r6:85a7a400 r5:85ad1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1edfb0 to 0xed1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820400 INFO: task kworker/1:725:6686 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d53d8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85ad0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8581e080 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:6690 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:6690 tgid:6690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f5d84 r8:00000002 r7:60000113 r6:ed1f5d8c r5:848a1800 r4:848a1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0df8c r4:85c0dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0df8c r4:8581e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a1800 r8:8581e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e100 r8:80287e08 r7:ed1f1e60 r6:85a7a500 r5:848a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f5fb0 to 0xed1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820700 INFO: task kworker/1:727:6690 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d53d8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:6692 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:6692 tgid:6692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f9d84 r8:00000002 r7:60000113 r6:ed1f9d8c r5:848a6c00 r4:848a6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e38c r4:85c0e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0e38c r4:8581e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a6c00 r8:8581e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e180 r8:80287e08 r7:ed1f5e60 r6:85a7a580 r5:848a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f9fb0 to 0xed1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820800 INFO: task kworker/1:728:6692 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d5e24000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:84918000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0eb8c r4:85c0e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8581e200 r8:80287e08 r7:ed1f9e60 r6:85a7a600 r5:84918000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:6695 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:6695 tgid:6695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1add84 r8:00000002 r7:60000013 r6:ed1add8c r5:85bc6000 r4:85bc6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e78c r4:85c0e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0e78c r4:8581e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc6000 r8:8581e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e280 r8:80287e08 r7:ed1fde60 r6:8581e300 r5:85bc6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1adfb0 to 0xed1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858209c0 INFO: task kworker/1:730:6695 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d5e24000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85bc6c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bc6c00 r8:8581e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:732:6700 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:6700 tgid:6700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed209d84 r8:00000002 r7:60000113 r6:ed209d8c r5:85bc3c00 r4:85bc3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed209e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858339c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ef8c r4:85c0ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0ef8c r4:8581e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc3c00 r8:8581e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e480 r8:80287e08 r7:ed1fde60 r6:8581e500 r5:85bc3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed209fb0 to 0xed209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858203c0 INFO: task kworker/1:732:6700 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d6859000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:733:6701 blocked for more than 479 seconds. r4:85bd0c00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed02f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bd0c00 r8:8581e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:6703 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:6703 tgid:6703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed211d84 r8:00000002 r7:60000113 r6:ed211d8c r5:85bd1800 r4:85bd1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bd1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed211e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bd1800 r8:8581e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:735 state:D stack:0 pid:6706 tgid:6706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed215d84 r8:00000002 r7:60000013 r6:ed215d8c r5:85bd3000 r4:85bd3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bd3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed215e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858266c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bd3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0fb8c r4:85c0f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0fb8c r4:8581e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bd3000 r8:8581e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e780 r8:80287e08 r7:ed211e60 r6:8581e800 r5:85bd3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed215fb0 to 0xed215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826340 INFO: task kworker/1:735:6706 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d6859000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:6708 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:6708 tgid:6708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed219d84 r8:00000002 r7:60000113 r6:ed219d8c r5:85bd0000 r4:85bd0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bd0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed219e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bd0000 r8:8581e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed219fb0 to 0xed219ff8) r4:85826280 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:737:6709 blocked for more than 479 seconds. r5:85bd3c00 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ff8c r4:85c0fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0ff8c r4:8581e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bd3c00 r8:8581e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e980 r8:80287e08 r7:ed219e60 r6:85a7a680 r5:85bd3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed21dfb0 to 0xed21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826280 INFO: task kworker/1:737:6709 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d70e6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed229e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84918c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1478c r4:85c14400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1478c r4:8581ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84918c00 r8:8581ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ea00 r8:80287e08 r7:ed219e60 r6:85a7a700 r5:84918c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed229fb0 to 0xed229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858268c0 INFO: task kworker/1:738:6712 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d70e6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84919800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed231e08 r5:00001000 r4:ed0d7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c14b8c r4:8581ea80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:6715 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:6715 tgid:6715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed235d84 r8:00000002 r7:60000013 r6:ed235d8c r5:8491b000 r4:8491b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed235e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c16b8c r4:85c16800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c16b8c r4:8581eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491b000 r8:8581eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581eb00 r8:80287e08 r7:ed231e60 r6:85a7a800 r5:8491b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed235fb0 to 0xed235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826c80 INFO: task kworker/1:740:6715 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d741c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:6722 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:6722 tgid:6722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed201d84 r8:00000002 r7:60000013 r6:ed201d8c r5:8491c800 r4:8491c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed201e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed11b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c15b8c r4:85c15800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c15b8c r4:8581ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491c800 r8:8581ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ec00 r8:80287e08 r7:ed235e60 r6:85a7a900 r5:8491c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed201fb0 to 0xed201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826b00 INFO: task kworker/1:742:6722 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d7836000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:6723 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:6723 tgid:6723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed22dd84 r8:00000002 r7:60000113 r6:ed22dd8c r5:8491d400 r4:8491d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858315c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1678c r4:85c16400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1678c r4:8581ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491d400 r8:8581ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: d824e000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:6728 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:6728 tgid:6728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed245d84 r8:00000002 r7:60000113 r6:ed245d8c r5:8491a400 r4:8491a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed245e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb707000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c16f8c r4:85c16c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c16f8c r4:8581ed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491a400 r8:8581ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ed00 r8:80287e08 r7:ed235e60 r6:85a7aa00 r5:8491a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed245fb0 to 0xed245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85831500 INFO: task kworker/1:744:6728 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d824e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba8980 r5:8491ec00 r4:8291a680 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1838c r4:85c18000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1838c r4:8581ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491ec00 r8:8581edac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ed80 r8:80287e08 r7:ed245e60 r6:85a7aa80 r5:8491ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed24dfb0 to 0xed24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:746:6732 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:6732 tgid:6732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed255d84 r8:00000002 r7:60000113 r6:ed255d8c r5:85be0c00 r4:85be0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed255e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb989000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xed255fb0 to 0xed255ff8) r4:00000000 r5:800f0013 r4:80239bb0 r4:00000000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:00001000 r4:ebb5d000 r5:85c1778c r4:85c17400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1778c r4:8581ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be1800 r8:8581ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ef00 r8:80287e08 r7:ed24de60 r6:85a7ab80 r5:85be1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed259fb0 to 0xed259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858319c0 INFO: task kworker/1:747:6733 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d882b000 dfb47000 00000001 80239b98 7f2fb000 00000001 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 task:kworker/1:748 state:D stack:0 pid:6735 tgid:6735 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831a80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85831b00 INFO: task kworker/1:748:6735 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d882b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831c80 r5:85c17f8c r4:85c17c00 r4:8581ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ee80 r8:80287e08 r7:ed24de60 r6:85a7ac80 r5:85be2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed269fb0 to 0xed269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858317c0 INFO: task kworker/1:749:6737 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)