Extracting prog: 11m46.121133237s Minimizing prog: 2h3m8.212200737s Simplifying prog options: 0s Extracting C: 8m58.465363078s Simplifying C: 58m36.756893429s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 7 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h22m29.555637512s repro crashed as (corrupted=false): INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a3c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85652b8c r4:85652800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85652b8c r4:830b8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:80287e08 r7:df83de60 r6:830b8680 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5940 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bc598000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400 r4:83242400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4d78c r4:85c4d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4d78c r4:830cc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:830cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc080 r8:80287e08 r7:df819d50 r6:830cc100 r5:83242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bcd94000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:3:3052 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3052 tgid:3052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e5d84 r8:00000002 r7:60000113 r6:ec6e5d8c r5:83b13000 r4:83b13000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b13000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b13000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504bb8c r4:8504b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504bb8c r4:8473e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b13000 r8:8473e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473e300 r8:80287e08 r7:df83de60 r6:8473e380 r5:83b13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8471e6c0 INFO: task kworker/0:3:3052 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bd6e2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:3:3118 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df95dd84 r8:00000002 r7:60000013 r6:df95dd8c r5:83ac8c00 r4:83ac8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ac8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df95de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad778c r4:84ad7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ad778c r4:8473df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ac8c00 r8:8473dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473df80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473df80 r8:80287e08 r7:ead2de60 r6:8473d900 r5:83ac8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf95dfb0 to 0xdf95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847eeac0 INFO: task kworker/1:3:3118 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: be361000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:5:3122 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9bdd84 r8:00000002 r7:60000113 r6:df9bdd8c r5:841ab000 r4:841ab000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ab000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b07c00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad6b8c r4:84ad6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ad6b8c r4:8473d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ab000 r8:8473d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d700 r8:80287e08 r7:df95de60 r6:8473d080 r5:841ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9bdfb0 to 0xdf9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847eed80 INFO: task kworker/1:5:3122 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:0:3123 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83b16000 r4:83b16000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b16000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b16000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504b78c r4:8504b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504b78c r4:8473e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b16000 r8:8473e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473e980 r8:80287e08 r7:ec6e5e60 r6:8473ec00 r5:83b16000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473f2c0 INFO: task kworker/0:0:3123 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:6:3126 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83b11800 r4:83b11800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b11800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b288c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b11800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509af8c r4:8509ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509af8c r4:8473d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b11800 r8:8473d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d580 r8:80287e08 r7:df95de60 r6:8473eb00 r5:83b11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a080 INFO: task kworker/1:6:3126 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:7:3127 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83b15400 r4:83b15400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b15400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beec40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b15400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f5f8c r4:850f5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f5f8c r4:8473d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b15400 r8:8473d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d680 r8:80287e08 r7:df9d5e60 r6:8473eb80 r5:83b15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a080 INFO: task kworker/1:7:3127 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:4:3130 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000013 r6:df9d1d8c r5:83b10000 r4:83b10000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b10000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483e380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b10000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84954b8c r4:84954800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84954b8c r4:8473ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b10000 r8:8473ecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ec80 r8:80287e08 r7:ec6e5e60 r6:8473ed00 r5:83b10000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483e2c0 INFO: task kworker/0:4:3130 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:5:3132 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c9d84 r8:00000002 r7:60000113 r6:df9c9d8c r5:83b12400 r4:83b12400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b12400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ac80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b12400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df915000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ca38c r4:857ca000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ca38c r4:8473ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b12400 r8:8473edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ed80 r8:80287e08 r7:df9d1e60 r6:8473ee00 r5:83b12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c9fb0 to 0xdf9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483e400 INFO: task kworker/0:5:3132 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3134 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83236000 r4:83236000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fd880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515cb8c r4:8515c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515cb8c r4:8473d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:8473d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d600 r8:80287e08 r7:df9d9e60 r6:8473ee80 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a640 INFO: task kworker/1:8:3134 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3136 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa0dd84 r8:00000002 r7:60000013 r6:dfa0dd8c r5:844a0000 r4:844a0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdcf00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85075f8c r4:85075c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85075f8c r4:8473ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0000 r8:8473ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ef00 r8:80287e08 r7:df9c9e60 r6:8473ef80 r5:844a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483e700 INFO: task kworker/0:6:3136 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3139 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:844a2400 r4:844a2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332f80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515f38c r4:8515f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515f38c r4:8473d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a2400 r8:8473d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d400 r8:80287e08 r7:dfa09e60 r6:8473ea00 r5:844a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a780 INFO: task kworker/1:9:3139 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3140 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:844a3c00 r4:844a3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85338ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528db8c r4:8528d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528db8c r4:8473d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a3c00 r8:8473d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d180 r8:80287e08 r7:dfa25e60 r6:8473e880 r5:844a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a780 INFO: task kworker/1:10:3140 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3142 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:844a0c00 r4:844a0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85449bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84470b8c r4:84470800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84470b8c r4:8473d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0c00 r8:8473d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d500 r8:80287e08 r7:dfa25e60 r6:8473e900 r5:844a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a8c0 INFO: task kworker/1:11:3142 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:844a4800 r4:844a4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538b740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea92b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84463f8c r4:84463c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84463f8c r4:8473de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a4800 r8:8473de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473de00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473de00 r8:80287e08 r7:dfa35e60 r6:8473e700 r5:844a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483aa00 INFO: task kworker/1:12:3144 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3147 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:844a6000 r4:844a6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048e000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532d78c r4:8532d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532d78c r4:8473dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6000 r8:8473dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473dc80 r8:80287e08 r7:dfa35e60 r6:8473e780 r5:844a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483ac40 INFO: task kworker/1:13:3147 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3148 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:844a6c00 r4:844a6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559dd00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653b8c r4:85653800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653b8c r4:84361e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6c00 r8:84361e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84361e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84361e00 r8:80287e08 r7:df9c9e60 r6:838bf480 r5:844a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483ee80 INFO: task kworker/0:7:3148 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3149 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000013 r6:dfa61d8c r5:844a5400 r4:844a5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c0680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532f38c r4:8532f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532f38c r4:8473db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a5400 r8:8473dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473db80 r8:80287e08 r7:dfa55e60 r6:83c74e00 r5:844a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483af80 INFO: task kworker/1:14:3149 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:833a9800 r4:833a9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833a9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560c100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb237000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84471f8c r4:84471c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84471f8c r4:8473de80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833a9800 r8:8473deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473de80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473de80 r8:80287e08 r7:dfa61e60 r6:83c74d80 r5:833a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483ae00 INFO: task kworker/1:15:3151 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3153 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa79d84 r8:00000002 r7:60000013 r6:dfa79d8c r5:8409ec00 r4:8409ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8409ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dbc00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8409ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547eb8c r4:8547e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547eb8c r4:8473df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8409ec00 r8:8473df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473df00 r8:80287e08 r7:dfa69e60 r6:83c74b80 r5:8409ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483af40 INFO: task kworker/1:16:3153 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3155 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:84098000 r4:84098000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84098000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84098000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532fb8c r4:8532f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532fb8c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84098000 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfa69e60 r6:83c74a80 r5:84098000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28100 INFO: task kworker/1:17:3155 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3157 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8409b000 r4:8409b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8409b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85668a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8409b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447238c r4:84472000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447238c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8409b000 r8:830b842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:dfa69e60 r6:830cc400 r5:8409b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28100 INFO: task kworker/1:18:3157 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3160 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:84098c00 r4:84098c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84098c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84098c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85643f8c r4:85643c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85643f8c r4:8336df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84098c00 r8:8336dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8336df80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8336df80 r8:80287e08 r7:dfa91e60 r6:830cc380 r5:84098c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a280c0 INFO: task kworker/1:19:3160 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:840b8c00 r4:840b8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840b8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba5b8c r4:85ba5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba5b8c r4:8473ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840b8c00 r8:8473eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ea80 r8:80287e08 r7:dfaa1e60 r6:84063680 r5:840b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28440 INFO: task kworker/1:20:3162 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3163 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:840b8000 r4:840b8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840b8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0571000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570278c r4:85702400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570278c r4:84146c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840b8000 r8:84146c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84146c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84146c00 r8:80287e08 r7:dfaa9e60 r6:84063600 r5:840b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28580 INFO: task kworker/1:21:3163 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3167 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:840bc800 r4:840bc800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bc800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c3900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f0b8c r4:857f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f0b8c r4:832a0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bc800 r8:832a02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0280 r8:80287e08 r7:dfaa9e60 r6:83351600 r5:840bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28680 INFO: task kworker/1:22:3167 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3169 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df981d84 r8:00000002 r7:60000013 r6:df981d8c r5:840ba400 r4:840ba400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840ba400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955b8c r4:84955800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84955b8c r4:83351580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840ba400 r8:833515ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83351580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83351580 r8:80287e08 r7:df9c9e60 r6:83c9c400 r5:840ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c200 INFO: task kworker/0:8:3169 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3171 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:840bec00 r4:840bec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85595a00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576678c r4:85766400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576678c r4:846cdb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bec00 r8:846cdb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846cdb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdb00 r8:80287e08 r7:df981e60 r6:846cdd80 r5:840bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c6c0 INFO: task kworker/0:9:3171 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3173 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:840bd400 r4:840bd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539c280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85855f8c r4:85855c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85855f8c r4:8485f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bd400 r8:8485f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f000 r8:80287e08 r7:df981e60 r6:8485f080 r5:840bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c4c0 INFO: task kworker/0:10:3173 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:840bb000 r4:840bb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955f8c r4:84955c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84955f8c r4:8485f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bb000 r8:8485f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f100 r8:80287e08 r7:dfad1e60 r6:8485f180 r5:840bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c640 INFO: task kworker/0:11:3175 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3177 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:84486000 r4:84486000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84486000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545bf40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84486000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585578c r4:85855400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585578c r4:8485f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84486000 r8:8485f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f200 r8:80287e08 r7:dfad1e60 r6:8485f280 r5:84486000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2ca00 INFO: task kworker/0:12:3177 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3180 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:84480000 r4:84480000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84480000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f2e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84480000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85856b8c r4:85856800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85856b8c r4:8485f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84480000 r8:8485f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f300 r8:80287e08 r7:dfad1e60 r6:8485f380 r5:84480000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2ccc0 INFO: task kworker/0:13:3180 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84485400 r4:84485400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84485400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84485400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec989000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84956b8c r4:84956800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84956b8c r4:8485f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84485400 r8:8485f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f400 r8:80287e08 r7:dfad9e60 r6:8485f480 r5:84485400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2ccc0 INFO: task kworker/0:14:3181 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3182 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83b1bc00 r4:83b1bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e4780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af1b8c r4:85af1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af1b8c r4:832a0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1bc00 r8:832a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0100 r8:80287e08 r7:dfaa9e60 r6:8485f500 r5:83b1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28cc0 INFO: task kworker/1:23:3182 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:83b1a400 r4:83b1a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2f940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495778c r4:84957400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495778c r4:8485f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1a400 r8:8485f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f580 r8:80287e08 r7:dfaede60 r6:8485f600 r5:83b1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744280 INFO: task kworker/0:15:3185 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:83b1b000 r4:83b1b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c32c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85974f8c r4:85974c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85974f8c r4:8485f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1b000 r8:8485f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f680 r8:80287e08 r7:dfb01e60 r6:8485f700 r5:83b1b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744440 INFO: task kworker/0:16:3187 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83b1c800 r4:83b1c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab16c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84957b8c r4:84957800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84957b8c r4:8485f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1c800 r8:8485f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f780 r8:80287e08 r7:dfb0de60 r6:8485f800 r5:83b1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847442c0 INFO: task kworker/0:17:3189 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:83b1e000 r4:83b1e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85438fc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597578c r4:85975400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597578c r4:8485f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1e000 r8:8485f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f880 r8:80287e08 r7:dfb0de60 r6:8485f900 r5:83b1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847443c0 INFO: task kworker/0:18:3192 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3193 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83af0c00 r4:83af0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83af0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83c922c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597738c r4:85977000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597738c r4:8485f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83af0c00 r8:8485f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f980 r8:80287e08 r7:dfb21e60 r6:8485fa00 r5:83af0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744540 INFO: task kworker/0:19:3193 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3195 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:83b21800 r4:83b21800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b21800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b21800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac4b8c r4:85ac4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac4b8c r4:8485fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b21800 r8:8485faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fa80 r8:80287e08 r7:dfb35e60 r6:8485fb00 r5:83b21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744780 INFO: task kworker/0:20:3195 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3198 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:84199800 r4:84199800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84199800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85435300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84199800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac5f8c r4:85ac5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac5f8c r4:8485fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84199800 r8:8485fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fb80 r8:80287e08 r7:dfb29e60 r6:8485fc00 r5:84199800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744840 INFO: task kworker/0:21:3198 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3200 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:841ac800 r4:841ac800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ac800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472dd80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8499d38c r4:8499d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8499d38c r4:8485fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ac800 r8:8485fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fc80 r8:80287e08 r7:dfb4de60 r6:84569700 r5:841ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744c80 INFO: task kworker/0:22:3200 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3202 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:841a8c00 r4:841a8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841a8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854542c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f16f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7df8c r4:85c7dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7df8c r4:8485fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841a8c00 r8:8485fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fd00 r8:80287e08 r7:dfb5de60 r6:84569780 r5:841a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744b80 INFO: task kworker/0:23:3202 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c283b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3205 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:841a8000 r4:841a8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841a8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed515000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf8f8c r4:85bf8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf8f8c r4:8485fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841a8000 r8:8485fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fd80 r8:80287e08 r7:dfb51e60 r6:8427fb00 r5:841a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744dc0 INFO: task kworker/0:24:3205 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c283b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb81d84 r8:00000002 r7:60000013 r6:dfb81d8c r5:841aa400 r4:841aa400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841aa400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec789000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfa78c r4:85bfa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bfa78c r4:8485fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841aa400 r8:8485fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fe00 r8:80287e08 r7:dfb51e60 r6:8475cd00 r5:841aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6100 INFO: task kworker/0:25:3208 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c2d47000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3210 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:83393c00 r4:83393c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83393c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85453840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83393c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed68d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfbb8c r4:85bfb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bfbb8c r4:8485fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83393c00 r8:8485feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fe80 r8:80287e08 r7:dfb51e60 r6:8477b000 r5:83393c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa60c0 INFO: task kworker/0:26:3210 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c2ff2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3211 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb91d84 r8:00000002 r7:60000013 r6:dfb91d8c r5:832eb000 r4:832eb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832eb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4d38c r4:85c4d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4d38c r4:8477b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832eb000 r8:8477b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8477b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477b080 r8:80287e08 r7:dfb3de60 r6:8477b100 r5:832eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84715400 INFO: task kworker/1:25:3211 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c33fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3213 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:84198000 r4:84198000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84198000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d4340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84198000 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed87f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6cf8c r4:85c6cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6cf8c r4:8485ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84198000 r8:8485ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485ff00 r8:80287e08 r7:dfb51e60 r6:8485ff80 r5:84198000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6300 INFO: task kworker/0:27:3213 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c35c6000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3215 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:8419c800 r4:8419c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8419c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d4ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8419c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed071000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6f78c r4:85c6f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6f78c r4:8471f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8419c800 r8:8471f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f000 r8:80287e08 r7:dfb51e60 r6:8471f080 r5:8419c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa63c0 INFO: task kworker/0:28:3215 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c367e000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3216 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:8419e000 r4:8419e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8419e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853428c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8419e000 r7:00000000 r6:83018000 r5:00001000 r4:7f235000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d46b8c r4:85d46800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d46b8c r4:8471f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8419e000 r8:8471f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f100 r8:80287e08 r7:dfb51e60 r6:8471f180 r5:8419e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa63c0 INFO: task kworker/0:29:3216 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c39fd000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3219 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:8419bc00 r4:8419bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8419bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83aa6300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8419bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed99b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7e78c r4:85c7e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7e78c r4:8471f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8419bc00 r8:8471f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f200 r8:80287e08 r7:dfb89e60 r6:8471f280 r5:8419bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6780 INFO: task kworker/0:30:3219 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c39fd000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3221 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84198c00 r4:84198c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84198c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be0500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84198c00 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7f78c r4:85c7f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7f78c r4:8471f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84198c00 r8:8471f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f380 r8:80287e08 r7:dfb89e60 r6:8471f400 r5:84198c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6b40 INFO: task kworker/0:31:3221 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3a85000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3223 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:83b0b000 r4:83b0b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f2bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9df8c r4:85c9dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9df8c r4:8471f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0b000 r8:8471f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f480 r8:80287e08 r7:dfb89e60 r6:8471f500 r5:83b0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6c40 INFO: task kworker/0:32:3223 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3dd3000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3225 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83b0c800 r4:83b0c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e3380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8499fb8c r4:8499f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8499fb8c r4:8471f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0c800 r8:8471f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f580 r8:80287e08 r7:dfbb9e60 r6:8471f600 r5:83b0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6b80 INFO: task kworker/0:33:3225 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3f81000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3227 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:83878c00 r4:83878c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83878c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852068c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9d38c r4:85c9d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9d38c r4:8471f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83878c00 r8:8471f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f680 r8:80287e08 r7:dfbb9e60 r6:8471f700 r5:83878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6e40 INFO: task kworker/0:34:3227 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3f81000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3229 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf1d84 r8:00000002 r7:60000013 r6:dfbf1d8c r5:8387ec00 r4:8387ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8387ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4db8c r4:85c4d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4db8c r4:8477b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387ec00 r8:8477b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8477b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477b180 r8:80287e08 r7:dfb3de60 r6:8471f780 r5:8387ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84715a00 INFO: task kworker/1:26:3229 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c4225000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3230 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83b2a400 r4:83b2a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852066c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9cb8c r4:85c9c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9cb8c r4:8471f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2a400 r8:8471f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f800 r8:80287e08 r7:dfbe9e60 r6:8477b200 r5:83b2a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744980 INFO: task kworker/0:35:3230 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c4280000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3233 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:83b2ec00 r4:83b2ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9d78c r4:85c9d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9d78c r4:8471f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2ec00 r8:8471f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f880 r8:80287e08 r7:dfbe9e60 r6:8477b280 r5:83b2ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947100 INFO: task kworker/0:36:3233 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c44fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3234 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:8387a400 r4:8387a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387a400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9db8c r4:85c9d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9db8c r4:8471f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387a400 r8:8471f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f900 r8:80287e08 r7:dfc0de60 r6:8471f980 r5:8387a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849473c0 INFO: task kworker/0:37:3234 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c44fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3238 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:8387c800 r4:8387c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387c800 r7:00000000 r6:83018000 r5:00001000 r4:7f2ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9bf8c r4:85c9bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9bf8c r4:8471fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387c800 r8:8471fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fa00 r8:80287e08 r7:dfc0de60 r6:8471fa80 r5:8387c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947340 INFO: task kworker/0:38:3238 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c48c4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3239 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:83b08c00 r4:83b08c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b08c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206c80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2bd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9e38c r4:85c9e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9e38c r4:8471fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b08c00 r8:8471fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fb00 r8:80287e08 r7:dfc05e60 r6:8471fb80 r5:83b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947340 INFO: task kworker/0:39:3239 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c4a86000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3241 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83b08000 r4:83b08000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b08000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b08000 r7:00000000 r6:83018000 r5:00001000 r4:7f2b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9cf8c r4:85c9cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9cf8c r4:8471fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b08000 r8:8471fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fc00 r8:80287e08 r7:dfbf9e60 r6:8471fc80 r5:83b08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849476c0 INFO: task kworker/0:40:3241 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c50bf000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3243 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:83af2400 r4:83af2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83af2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f2af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9c78c r4:85c9c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9c78c r4:8471fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83af2400 r8:8471fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fd00 r8:80287e08 r7:dfbf9e60 r6:8471fd80 r5:83af2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947ac0 INFO: task kworker/0:41:3243 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5542000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3245 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84870000 r4:84870000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84870000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84870000 r7:00000000 r6:83018000 r5:00001000 r4:7f2ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9c38c r4:85c9c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9c38c r4:8471fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84870000 r8:8471fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fe00 r8:80287e08 r7:dfa41e60 r6:8471fe80 r5:84870000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947940 INFO: task kworker/0:42:3245 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5542000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3247 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:84870c00 r4:84870c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84870c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84870c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9bb8c r4:85c9b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9bb8c r4:8471ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84870c00 r8:8471ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471ff00 r8:80287e08 r7:dfc15e60 r6:8471ff80 r5:84870c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947d00 INFO: task kworker/0:43:3247 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5542000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3249 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84871800 r4:84871800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84871800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206cc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84871800 r7:00000000 r6:83018000 r5:00001000 r4:7f2bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9e78c r4:85c9e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9e78c r4:8499a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84871800 r8:8499a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a000 r8:80287e08 r7:dfc19e60 r6:8499a080 r5:84871800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947c80 INFO: task kworker/0:44:3249 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5e90000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3250 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:84873000 r4:84873000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84873000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84873000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9eb8c r4:85c9e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9eb8c r4:8499a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84873000 r8:8499a12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a100 r8:80287e08 r7:dfc1de60 r6:8499a180 r5:84873000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947d80 INFO: task kworker/0:45:3250 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5e90000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3253 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84873c00 r4:84873c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84873c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84873c00 r7:00000000 r6:83018000 r5:00001000 r4:7f265000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed307000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9ef8c r4:85c9ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9ef8c r4:8499a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84873c00 r8:8499a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a200 r8:80287e08 r7:dfa2de60 r6:8499a280 r5:84873c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54280 INFO: task kworker/0:46:3253 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c661c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3255 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:84875400 r4:84875400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84875400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f267000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed547000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9f38c r4:85c9f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9f38c r4:8499a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84875400 r8:8499a32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a300 r8:80287e08 r7:dfc21e60 r6:8499a380 r5:84875400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54200 INFO: task kworker/0:47:3255 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c661c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3258 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc25d84 r8:00000002 r7:60000013 r6:dfc25d8c r5:83b2c800 r4:83b2c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4e38c r4:85c4e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4e38c r4:8477b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2c800 r8:8477b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8477b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477b300 r8:80287e08 r7:dfb3de60 r6:8477b380 r5:83b2c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ee780 INFO: task kworker/1:27:3258 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c661c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3259 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:83b29800 r4:83b29800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b29800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f2cb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9ff8c r4:85c9fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9ff8c r4:8499a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b29800 r8:8499a42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a400 r8:80287e08 r7:dfc29e60 r6:8477b400 r5:83b29800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54580 INFO: task kworker/0:48:3259 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c6d6b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3264 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:841ad400 r4:841ad400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ad400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f2c9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed879000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9fb8c r4:85c9f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9fb8c r4:8499a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ad400 r8:8499a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a480 r8:80287e08 r7:dfc2de60 r6:8477b580 r5:841ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54780 INFO: task kworker/0:49:3264 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c6d6b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3266 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:83868c00 r4:83868c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83868c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c2c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9f78c r4:85c9f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9f78c r4:8499a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83868c00 r8:8499a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a500 r8:80287e08 r7:dfc3de60 r6:8477b600 r5:83868c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54840 INFO: task kworker/0:50:3266 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c6d6b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3268 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:83869800 r4:83869800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83869800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543ca00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83869800 r7:00000000 r6:83018000 r5:00001000 r4:7f2d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca0f8c r4:85ca0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca0f8c r4:8499a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83869800 r8:8499a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a580 r8:80287e08 r7:dfc45e60 r6:8477b680 r5:83869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54980 INFO: task kworker/0:51:3268 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c71c4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3269 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:8386e000 r4:8386e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c6c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8386e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2cd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed987000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca038c r4:85ca0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca038c r4:8499a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386e000 r8:8499a62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a600 r8:80287e08 r7:dfc4de60 r6:8477b700 r5:8386e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54980 INFO: task kworker/0:52:3269 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c74d7000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e0105dc0 r4:00000001 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3271 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:8386b000 r4:8386b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inlin <> :1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5448 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:85736c00 r4:85736c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85736c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f2180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85736c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575838c r4:85758000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575838c r4:855a0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85736c00 r8:855a0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0d80 r8:80287e08 r7:ebafde60 r6:855a0e00 r5:85736c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85733000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:8575878c r4:85758400 r10:61c88647 r9:85733000 r8:855a0eac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 8ca6e000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:e043ddc0 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:5454 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb01d84 r8:00000002 r7:60000113 r6:ebb01d8c r5:85735400 r4:85735400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85735400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f2540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85735400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb873000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85758f8c r4:85758c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85758f8c r4:855a0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85735400 r8:855a0fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0f80 r8:80287e08 r7:ebafde60 r6:85610000 r5:85735400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f2580 INFO: task kworker/0:771:5454 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8d145000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:8575938c r4:85759000 r10:61c88647 r9:84836c00 r8:856100ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8d145000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:5457 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:848dec00 r4:848dec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f2940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575978c r4:85759400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575978c r4:85610180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dec00 r8:856101ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610180 r8:80287e08 r7:ebad1e60 r6:85610200 r5:848dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb15fb0 to 0xebb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f26c0 INFO: task kworker/0:773:5457 is blocked on a mutex likely owned by task kworker/0:174:3633. [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e043ddc0 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:774 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:84880000 r4:84880000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84880000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f29c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84880000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85759b8c r4:85759800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85759b8c r4:85610280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84880000 r8:856102ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610280 r8:80287e08 r7:ebb15e60 r6:85610300 r5:84880000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f2900 INFO: task kworker/0:774:5460 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8d685000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575a38c r4:8575a000 r7:dddced80 r6:83018000 r5:8575a38c r4:85610380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84880c00 r8:856103ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610380 r8:80287e08 r7:ebb19e60 r6:85610400 r5:84880c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f2900 INFO: task kworker/0:775:5461 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8da82000 e0435000 00000001 80239b98 7f4e1000 00000001 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85759f8c r4:85759c00 r10:61c88647 r9:84882400 r8:856104ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 8df4c000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:5465 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb31d84 r8:00000002 r7:60000113 r6:ebb31d8c r5:84883c00 r4:84883c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84883c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85703b8c r4:85703800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85703b8c r4:855f0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84883c00 r8:855f03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0380 r8:80287e08 r7:eb84de60 r6:85610580 r5:84883c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f7ec0 INFO: task kworker/1:388:5465 is blocked on a mutex likely owned by task kworker/0:174:3633. [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8570238c r4:85702000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570238c r4:855f0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84881800 r8:855f042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0400 r8:80287e08 r7:ebb31e60 r6:85610600 r5:84881800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f7ec0 INFO: task kworker/1:389:5466 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8e1d0000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 INFO: task kworker/0:777:5469 blocked for more than 476 seconds. r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:84885400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8575af8c r4:85610680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84885400 r8:856106ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610680 r8:80287e08 r7:ebb1de60 r6:85610700 r5:84885400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d100 INFO: task kworker/0:777:5469 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8e326000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:5470 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8575a78c r4:8575a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85783c00 r8:856107ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85785400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 r5:8575ab8c r4:8575a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85610800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/0:780:5476 blocked for more than 476 seconds. r10:8291a684 r9:ebb59d84 r8:00000002 r7:60000113 r6:ebb59d8c r5:85786c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r9:83018005 r8:85786c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 r5:8575b38c r4:8575b000 r10:61c88647 r9:85786c00 r8:856108ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d400 INFO: task kworker/0:780:5476 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8ec15000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:5477 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:5477 tgid:5477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb65d84 r8:00000002 r7:60000113 r6:ebb65d8c r5:85783000 r4:85783000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85783000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d8c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85783000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb61000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575bb8c r4:8575b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575bb8c r4:85610900 r10:61c88647 r9:85783000 r8:8561092c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d740 r5:8575b78c r4:8575b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575b78c r4:85610980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85786000 r8:856109ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610980 r8:80287e08 r7:ebb65e60 r6:855f0680 r5:85786000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d6c0 INFO: task kworker/0:782:5480 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8f30e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:5481 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:5481 tgid:5481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb79d84 r8:00000002 r7:60000113 r6:ebb79d8c r5:856c6c00 r4:856c6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575bf8c r4:8575bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575bf8c r4:85610a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c6c00 r8:85610a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610a00 r8:80287e08 r7:ebb65e60 r6:855f0700 r5:856c6c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8560d800 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 dd20: 8f67e000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:82ac21e4 r4:e043ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:784:5483 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r5:85780000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb85e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560dd40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85780000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576438c r4:85764000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576438c r4:85610a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780000 r8:85610aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610a80 r8:80287e08 r7:ebb79e60 r6:855f0780 r5:85780000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d9c0 INFO: task kworker/0:784:5483 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8fb2e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:5485 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb8dd84 r8:00000002 r7:60000113 r6:ebb8dd8c r5:85784800 r4:85784800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85784800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:85784800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 task:kworker/1:390 state:D stack:0 pid:5489 tgid:5489 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85788000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:85702b8c r4:85702800 r10:61c88647 r9:85788000 r8:855f08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:5490 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85788c00 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85702f8c r4:85702c00 r10:61c88647 r9:85788c00 r8:855f09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:e043ddc0 r5:84b4f38c r4:84b4f000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:85789800 r4:85789800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85789800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85789800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570338c r4:85703000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570338c r4:855f0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85789800 r8:855f0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0b00 r8:80287e08 r7:ebb31e60 r6:855f0b80 r5:85789800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677680 INFO: task kworker/1:392:5492 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0113 r4:80239bb0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 r5:8570378c r4:85703400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855f0a80 r8:80287e08 r7:ebb31e60 r6:855f0c00 r5:8578a400 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 task:kworker/1:394 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856779c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8578b000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb125000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85703f8c r4:85703c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85703f8c r4:855f0c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578b000 r8:855f0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0c80 r8:80287e08 r7:ebb31e60 r6:855f0d00 r5:8578b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677780 INFO: task kworker/1:394:5497 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 90d0e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5499 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba01d84 r8:00000002 r7:60000113 r6:eba01d8c r5:8578bc00 r4:8578bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fa5c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8578bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb595000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576478c r4:85764400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576478c r4:85610b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578bc00 r8:85610bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610b80 r8:80287e08 r7:ebb8de60 r6:855f0d80 r5:8578bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:5500 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eba59d84 r8:00000002 r7:60000113 r6:eba59d8c r5:84886c00 r9:83018205 r8:84886c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r5:00001000 r4:e0447000 r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:5502 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:5502 tgid:5502 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857c038c r4:857c0000 r10:00000000 r9:855f0e80 r8:80287e08 r7:eba59e60 r6:85610c80 r5:84886000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 INFO: task kworker/1:397:5504 blocked for more than 476 seconds. r10:8291a684 r9:ebba5d84 r8:00000002 r7:60000113 r6:ebba5d8c r5:84884800 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857c0b8c r4:857c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855f0f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0f00 r8:80287e08 r7:ebb9de60 r6:85610d00 r5:84884800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba5fb0 to 0xebba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677c80 INFO: task kworker/1:397:5504 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 916c4000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:5505 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000013 r6:ebba9d8c r5:84788000 r4:84788000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84788000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84788000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb410000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c078c r4:857c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c078c r4:855f0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84788000 r8:855f0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0f80 r8:80287e08 r7:ebba5e60 r6:85610d80 r5:84788000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677c80 INFO: task kworker/1:398:5505 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 916c4000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aecb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8478a400 r4:8291a680 r9:83018205 r8:8478a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:857c138c r4:857c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855fb000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:400:5509 blocked for more than 476 seconds. r4:84788c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r5:00001000 r4:eb4c3000 r5:857c0f8c r4:857c0c00 r7:ddde2d80 r6:83018200 r5:857c0f8c r4:855fb080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 91bb1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 task:kworker/0:787 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8478b000 r8:85610f2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0447000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:8291a684 r9:ebbbdd84 r8:00000002 r7:60000113 r6:ebbbdd8c r5:8478bc00 r4:8478bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fc0c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c178c r4:857c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c178c r4:855fb100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478bc00 r8:855fb12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fb100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fb100 r8:80287e08 r7:ebbb5e60 r6:855f9000 r5:8478bc00 r4:85677e80 dd20: 9231b000 e0435000 00000001 80239b98 7f4e1000 00000001 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r4:00000001 INFO: task kworker/1:402:5516 blocked for more than 476 seconds. [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:857c238c r4:855fb180 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:5517 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:8478c800 r4:8478c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fc300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c1b8c r4:857c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c1b8c r4:855fb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:855fc280 Exception stack(0xe043dd28 to 0xe043dd70) dd20: 92731000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857c1f8c r4:857c1c00 r10:61c88647 r9:8478d400 r8:855fb2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:5521 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc01d84 r8:00000002 r7:60000013 r6:ebc01d8c r5:8478ec00 r4:8478ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8478ec00 r8:855fb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 92797000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 r4:84b0e300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84789800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r5:857c278c r4:857c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855fb380 Exception stack(0xebc09fb0 to 0xebc09ff8) r4:855fc780 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:407:5525 blocked for more than 477 seconds. r4:85800c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r5:00001000 r4:eb7d5000 r7:ddde2d80 r6:83018200 r5:857c2b8c r4:855fb400 r4:855fc640 INFO: task kworker/1:407:5525 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 92f98000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:84aecb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857c2f8c r4:857c2c00 r4:855fb480 r4:855fc700 Exception stack(0xe043dd28 to 0xe043dd70) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85801800 r4:8291a680 r4:00000000 r5:857c338c r4:857c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c338c r4:855fb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85801800 r8:855fb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fb500 r8:80287e08 r7:ebc01e60 r6:855f9400 r5:85801800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855fc700 INFO: task kworker/1:409:5529 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 93360000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fcb00 r10:61c88647 r9:85803c00 r8:855fb5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855fca00 INFO: task kworker/1:410:5531 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 93360000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:00000000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:411:5533 blocked for more than 477 seconds. r4:00000000 r5:857c3b8c r4:857c3800 r10:61c88647 r9:85802400 r8:855fb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:e043ddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:412:5535 blocked for more than 477 seconds. [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) dd20: 93fe7000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:5537 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb1d84 r8:00000002 r7:60000113 r6:ebbb1d8c r5:8578c800 r4:8578c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fab40 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855fb700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 94244000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:5541 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:5541 tgid:5541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc4dd84 r8:00000002 r7:60000113 r6:ebc4dd8c r5:8578ec00 r4:8578ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855fb900 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc51d84 r8:00000002 r7:60000113 r6:ebc51d8c r5:85790000 r4:85790000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85790000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85790000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576538c r4:85765000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576538c r4:855fba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85790000 r8:855fba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fba00 r8:80287e08 r7:ebc4de60 r6:855fba80 r5:85790000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc51fb0 to 0xebc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558a180 INFO: task kworker/1:416:5543 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 94490000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:85806000 r4:85806000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85806000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558a540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85806000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c8f8c r4:857c8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c8f8c r4:855f9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85806000 r8:855f962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855f9600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f9600 r8:80287e08 r7:ebb8de60 r6:855f9680 r5:85806000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855892c0 INFO: task kworker/0:788:5546 is blocked on a mutex likely owned by task kworker/0:174:3633. Workqueue: events bpf_prog_free_deferred [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:82ac21e4 r4:e043ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:5548 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc59d84 r8:00000002 r7:60000013 r6:ebc59d8c r5:85805400 r4:85805400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85805400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558a740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85805400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c938c r4:857c9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c938c r4:855fbb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85805400 r8:855fbb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbb00 r8:80287e08 r7:ebc4de60 r6:855f9700 r5:85805400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558a3c0 INFO: task kworker/1:417:5548 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9484b000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:789 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85806c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc5de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855952c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85806c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb871000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85765f8c r4:85765c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85765f8c r4:855f9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85806c00 r8:855f97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855f9780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f9780 r8:80287e08 r7:eb9a5e60 r6:855f9800 r5:85806c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc5dfb0 to 0xebc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85589580 INFO: task kworker/0:789:5550 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:00001000 r4:eba0f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 94f7c000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe043dfb0 to 0xe043dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:5554 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:5554 tgid:5554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc69d84 r8:00000002 r7:60000013 r6:ebc69d8c r5:84883000 r4:84883000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84883000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558a940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84883000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c9b8c r4:857c9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c9b8c r4:855fbc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84883000 r8:855fbc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbc00 r8:80287e08 r7:ebc4de60 r6:855f9900 r5:84883000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc69fb0 to 0xebc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 94f7c000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8291a684 r9:ebc71d84 r8:00000002 r7:60000113 r6:ebc71d8c r5:848c0c00 r5:00001000 r4:dfa97000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 95397000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:848c2400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558aec0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 9581b000 e0435000 00000001 80239b98 7f4e1000 00000001 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:848c3000 r4:848c3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558afc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cab8c r4:857ca800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cab8c r4:855fbd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3000 r8:855fbdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbd80 r8:80287e08 r7:ebc4de60 r6:855f9b80 r5:848c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558af40 INFO: task kworker/1:422:5563 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eadb7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857caf8c r4:857cac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857caf8c r4:855fbe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85790c00 r8:855fbe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbe00 r8:80287e08 r7:ebc4de60 r6:855fbe80 r5:85790c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558af40 INFO: task kworker/1:423:5565 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 95c50000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:5568 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:85792400 r4:85792400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85792400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e1140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85792400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb037000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cb38c r4:857cb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85792400 r8:855fbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:84b0e300 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebc6dd84 r8:00000002 r7:60000013 r6:ebc6dd8c r5:85794800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e12c0 r5:00001000 r4:eb241000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cb78c r4:857cb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cb78c r4:85596000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85794800 r8:8559602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596000 r8:80287e08 r7:ebc4de60 r6:85596080 r5:85794800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc6dfb0 to 0xebc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1200 INFO: task kworker/1:425:5570 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 95e33000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:5571 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:5571 tgid:5571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:85795400 r4:85795400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85795400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e1680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cbb8c r4:857cb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cbb8c r4:85596100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85795400 r8:8559612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596100 r8:80287e08 r7:ebc4de60 r6:85596180 r5:85795400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1200 INFO: task kworker/1:426:5571 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9610a000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85796000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r5:00001000 r4:eb7ef000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xebb05fb0 to 0xebb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85589d00 INFO: task kworker/0:791:5572 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 963bb000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:85796c00 r4:85796c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85796c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d078c r4:857d0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d078c r4:85596280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85796c00 r8:855962ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b0e300 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r5:00001000 r4:eb67b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85596380 r8:80287e08 r7:eba9de60 r6:855f9c80 r5:848c3c00 r4:855e1880 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:429:5579 blocked for more than 477 seconds. r5:848c6c00 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2c2c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d178c r4:857d1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d178c r4:85596400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6c00 r8:8559642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596400 r8:80287e08 r7:eba9de60 r6:855f9d00 r5:848c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1980 INFO: task kworker/1:429:5579 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 967ac000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 96c24000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:e043ddc0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb707000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d0f8c r4:85596500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0000 r8:8559652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596500 r8:80287e08 r7:ebc75e60 r6:855f9e00 r5:848c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec491fb0 to 0xec491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1ac0 INFO: task kworker/1:431:5582 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97157000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:5583 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848c5400 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d1f8c r4:857d1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:5587 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:848c4800 r4:848c4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb81d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c4800 r8:8559662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596600 r8:80287e08 r7:ec495e60 r6:855f9f00 r5:848c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1ec0 INFO: task kworker/1:433:5587 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97489000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred r5:85798000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855951c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85765b8c r4:85765800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85765b8c r4:855f9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85798000 r8:855f9fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855f9f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f9f80 r8:80287e08 r7:ebc5de60 r6:85580000 r5:85798000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec499fb0 to 0xec499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d880 INFO: task kworker/0:792:5588 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97722000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 r5:84b4f38c r4:84b4f000 Exception stack(0xe043dfb0 to 0xe043dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85791800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb88f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85580080 r8:80287e08 r7:ebc5de60 r6:85596680 r5:85791800 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:e0447000 r4:00000001 INFO: task kworker/0:794:5594 blocked for more than 477 seconds. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85595e00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8578d400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85766f8c r4:85766c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85766f8c r4:85580100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578d400 r8:8558012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580100 r8:80287e08 r7:ec4a5e60 r6:85596700 r5:8578d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4adfb0 to 0xec4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85595380 INFO: task kworker/0:794:5594 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97e79000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:5595 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4b1d84 r8:00000002 r7:60000113 r6:ec4b1d8c r5:85793000 r4:85793000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85793000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85595680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85793000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85766b8c r4:85766800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85766b8c r4:85580180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85793000 r8:855801ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580180 r8:80287e08 r7:ec4ade60 r6:85596780 r5:85793000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b1fb0 to 0xec4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85595380 INFO: task kworker/0:795:5595 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9861e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec4b5fb0 to 0xec4b5ff8) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:435 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4a9d84 r8:00000002 r7:60000013 r6:ec4a9d8c r5:857a1800 r4:857a1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855825c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d238c r4:857d2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d238c r4:85596900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a1800 r8:8559692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596900 r8:80287e08 r7:ec4b5e60 r6:85596980 r5:857a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a9fb0 to 0xec4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85582500 INFO: task kworker/1:435:5599 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9861e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r4:84aecb80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d2f8c r4:857d2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85596a00 r8:80287e08 r7:ec4b5e60 r6:85596a80 r5:857a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85582680 INFO: task kworker/1:436:5602 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9861e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:5603 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec49dd84 r8:00000002 r7:60000013 r6:ec49dd8c r5:857a3000 r4:857a3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec49de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85582840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d2b8c r4:857d2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d2b8c r4:85596b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a3000 r8:85596b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596b00 r8:80287e08 r7:ebb4de60 r6:85596b80 r5:857a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec49dfb0 to 0xec49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:438 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb085000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d338c r4:857d3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d338c r4:85596c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a3c00 r8:85596c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596c00 r8:80287e08 r7:ebb4de60 r6:85596c80 r5:857a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855829c0 INFO: task kworker/1:438:5605 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 99341000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:5607 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4b9d84 r8:00000002 r7:60000013 r6:ec4b9d8c r5:857a4800 r4:857a4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85582e80 r5:00001000 r4:eb385000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 INFO: task kworker/1:440:5608 blocked for more than 477 seconds. r4:85798c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c1e08 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85596e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:5612 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:5612 tgid:5612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4d1d84 r8:00000002 r7:60000113 r6:ec4d1d8c r5:8579bc00 r4:8579bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb449000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d3f8c r4:857d3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d3f8c r4:85596e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579bc00 r8:85596eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596e80 r8:80287e08 r7:ec4b9e60 r6:85580280 r5:8579bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d1fb0 to 0xec4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0000 INFO: task kworker/1:441:5612 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 99739000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:5614 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:5614 tgid:5614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:8579a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d9e08 r5:00001000 r4:eb49f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d438c r4:857d4000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb785000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d538c r4:857d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d538c r4:85596f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579c800 r8:85596fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596f80 r8:80287e08 r7:ec4d9e60 r6:85580380 r5:8579c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4ddfb0 to 0xec4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f02c0 INFO: task kworker/1:443:5615 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 99d0f000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:5618 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:5618 tgid:5618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4bdd84 r8:00000002 r7:60000113 r6:ec4bdd8c r5:857a5400 r4:857a5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d4b8c r4:857d4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d4b8c r4:854f7080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a5400 r8:854f70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7080 r8:80287e08 r7:ec4dde60 r6:854f7100 r5:857a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4bdfb0 to 0xec4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0340 INFO: task kworker/1:445:5618 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9a202000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:5621 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4e9d84 r8:00000002 r7:60000113 r6:ec4e9d8c r5:857a6000 r4:857a6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d4f8c r4:857d4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d4f8c r4:854f7180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec4e9fb0 to 0xec4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0540 INFO: task kworker/1:446:5621 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 dd20: 9abcc000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:857a0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c5e08 r5:00001000 r4:eb8ed000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4f9d84 r8:00000002 r7:60000113 r6:ec4f9d8c r5:857a8000 r4:857a8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ef980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576738c r4:85767000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576738c r4:85580480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a8000 r8:855804ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580480 r8:80287e08 r7:ec4ade60 r6:854f7380 r5:857a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f9fb0 to 0xec4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85595c00 INFO: task kworker/0:796:5626 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9abcc000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec4edd84 r8:00000002 r7:60000113 r6:ec4edd8c r5:85799800 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8576778c r4:85767400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r4:e043ddc0 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r4:84aecb80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:5629 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4f1d84 r8:00000002 r7:60000013 r6:ec4f1d8c r5:8579d400 r4:8579d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579d400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb905000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d5b8c r4:857d5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d5b8c r4:854f7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579d400 r8:854f742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7400 r8:80287e08 r7:ec4c5e60 r6:85580600 r5:8579d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f1fb0 to 0xec4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f09c0 INFO: task kworker/1:448:5629 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe043dfb0 to 0xe043dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r5:857d638c r4:857d6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854f7480 r8:80287e08 r7:ec4f1e60 r6:85580680 r5:85793c00 Workqueue: events bpf_prog_free_deferred [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9b0e1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:5634 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:5634 tgid:5634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:8579e000 r4:8579e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:857d5f8c r4:857d5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r5:84b4f38c r4:84b4f000 r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:451:5635 blocked for more than 478 seconds. r4:84970000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec51de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857d738c r4:857d7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d738c r4:854f7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970000 r8:854f75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7580 r8:80287e08 r7:ec511e60 r6:85580780 r5:84970000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec51dfb0 to 0xec51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0e80 INFO: task kworker/1:451:5635 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9b809000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:857d678c r4:857d6400 r7:ddde2d80 r6:83018200 r5:857d678c r4:854f7600 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:5640 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:5640 tgid:5640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec531d84 r8:00000002 r7:60000113 r6:ec531d8c r5:84970c00 r4:84970c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec531e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d6b8c r4:857d6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d6b8c r4:854f7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970c00 r8:854f76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7680 r8:80287e08 r7:ec51de60 r6:85580880 r5:84970c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec531fb0 to 0xec531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6000 INFO: task kworker/1:453:5640 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:5641 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:5641 tgid:5641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec535d84 r8:00000002 r7:60000113 r6:ec535d8c r5:84972400 r4:84972400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84972400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6200 r5:857d6f8c r4:857d6c00 r4:854f7700 r4:854e6000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec539d84 r8:00000002 r7:60000113 r6:ec539d8c r5:84973c00 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84973c00 r8:854f77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:5646 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:5646 tgid:5646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec53dd84 r8:00000002 r7:60000013 r6:ec53dd8c r5:84974800 r4:84974800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84974800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec53de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d778c r4:857d7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d778c r4:854f7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84974800 r8:854f782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7800 r8:80287e08 r7:ec539e60 r6:85580a00 r5:84974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec53dfb0 to 0xec53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6440 INFO: task kworker/1:456:5646 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:84975400 r5:84975400 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:eba3d000 r5:857d7f8c r4:857d7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d7f8c r4:854f7880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84975400 r8:854f78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7880 r10:00000000 r9:854f7880 r8:80287e08 r7:ec539e60 r6:85580a80 r5:84975400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe043dd28 to 0xe043dd70) dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:5650 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec505d84 r8:00000002 r7:60000113 r6:ec505d8c r5:84976000 r4:84976000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84976000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eff40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84976000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85767f8c r4:85767c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85767f8c r4:85580b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84976000 r8:85580b2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec505fb0 to 0xec505ff8) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:799:5651 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84976c00 r4:8291a680 r4:00000000 r5:85767b8c r4:85767800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85767b8c r4:85580c00 r4:85580c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:458:5653 blocked for more than 478 seconds. r4:8579ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec549e08 r4:00000000 r5:857e038c r4:857e0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854f7900 Exception stack(0xec549fb0 to 0xec549ff8) r4:854e6800 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:800:5657 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:800 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec509d84 r8:00000002 r7:60000113 r6:ec509d8c r5:85818000 r4:85818000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85818000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec509e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d2c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85818000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584438c r4:85844000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8584438c r4:85580d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85818000 r8:85580dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580d80 r8:80287e08 r7:ec505e60 r6:85580e00 r5:85818000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec509fb0 to 0xec509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854efec0 INFO: task kworker/0:800:5657 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec545e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495578c r4:84955400 r10:61c88647 r9:85818c00 r8:85580eac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:84b4f38c r4:84b4f000 r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:5659 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec551d84 r8:00000002 r7:60000113 r6:ec551d8c r5:85819800 r4:85819800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85819800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec551e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85819800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e078c r4:857e0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e078c r4:854f7980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85819800 r8:854f79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7980 r8:80287e08 r7:ec549e60 r6:85580f80 r5:85819800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec551fb0 to 0xec551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e69c0 INFO: task kworker/1:459:5659 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9d62d000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b4f38c r4:84b4f000 r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/0:802:5662 blocked for more than 478 seconds. r4:8581a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec54de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8495538c r4:854e3000 r10:00000000 r9:854e3000 r8:80287e08 r7:ec509e60 r6:854e3080 r5:8581a400 r4:84a2c440 Workqueue: events bpf_prog_free_deferred [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9e037000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:5663 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec559d84 r8:00000002 r7:60000113 r6:ec559d8c r5:8581b000 r4:8581b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec559e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:857e0b8c r4:857e0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e0b8c r4:854f7a00 r4:854f7a00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe043dd28 to 0xe043dd70) r4:00000000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:461 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:8581d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r10:61c88647 r9:8581d400 r8:854f7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec565fb0 to 0xec565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6cc0 INFO: task kworker/1:461:5666 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9e650000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:462:5668 blocked for more than 478 seconds. r4:8581ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec56de08 r9:83018205 r8:8581ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:857e0f8c r4:857e0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8581ec00 r8:854f7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aecb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec575d84 r8:00000002 r7:60000013 r6:ec575d8c r5:8581c800 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebae3000 r5:857e138c r4:857e1000 r7:ddde2d80 r6:83018200 r5:857e138c r4:854f7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581c800 r8:854f7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7c00 r8:80287e08 r7:ec565e60 r6:854e3280 r5:8581c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec575fb0 to 0xec575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e65c0 INFO: task kworker/1:463:5670 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9eb4d000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:464:5671 blocked for more than 478 seconds. r4:8581e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec579e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857e238c r4:857e2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e238c r4:854f7b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581e000 r8:854f7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7b80 r8:80287e08 r7:ec565e60 r6:854e3300 r5:8581e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec579fb0 to 0xec579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6580 INFO: task kworker/1:464:5671 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9eb4d000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857e1b8c r4:857e1800 r10:61c88647 r9:85820c00 r8:854f7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:5675 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:85820000 r4:85820000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85820000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85820000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df973000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e1f8c r4:857e1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e1f8c r4:854f7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85820000 r8:854f7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7d00 r8:80287e08 r7:ec579e60 r6:854e3400 r5:85820000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9280 INFO: task kworker/1:466:5675 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9f328000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:5677 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec58dd84 r8:00000002 r7:60000113 r6:ec58dd8c r5:85823000 r4:85823000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85823000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e96c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85823000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e2f8c r4:857e2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e2f8c r4:854f7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85823000 r8:854f7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7e00 r8:80287e08 r7:ec579e60 r6:854e3480 r5:85823000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9100 INFO: task kworker/1:467:5677 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9f577000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:5679 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:5679 tgid:5679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec595d84 r8:00000002 r7:60000013 r6:ec595d8c r5:85822400 r4:85822400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85822400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec595e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85822400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e278c r4:857e2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e278c r4:854f7d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85822400 r8:854f7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7d80 r8:80287e08 r7:ec58de60 r6:854e3500 r5:85822400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9200 INFO: task kworker/1:468:5679 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9f7cd000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:5681 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ec599d84 r8:00000002 r7:60000113 r6:ec599d8c r5:85823c00 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e95c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85823c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e2b8c r4:857e2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85823c00 r8:854f7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:5684 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5a1d84 r8:00000002 r7:60000113 r6:ec5a1d8c r5:85825400 r4:85825400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85825400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85825400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:857e338c r4:857e3000 r10:00000000 r9:854f7f00 r8:80287e08 r7:ec58de60 r6:854e3600 r5:85825400 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:e043ddc0 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 Workqueue: events bpf_prog_free_deferred [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857e4b8c r4:857e4800 r4:854f7f80 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85824800 r4:8291a680 r4:00000000 r9:83018205 r8:85824800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:857e378c r4:857e3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854d3000 dfa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:857e3b8c r4:854d3080 r10:00000000 r9:854d3080 r8:80287e08 r7:ec5b1e60 r6:854e3780 r5:85826c00 r4:854e97c0 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:5691 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5d5d84 r8:00000002 r7:60000113 r6:ec5d5d8c r5:85821800 r4:85821800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85821800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9b80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85821800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857e3f8c r4:857e3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85821800 r8:854d312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:475:5693 blocked for more than 478 seconds. r4:84978c00 r4:00000000 r4:00000000 r5:857e438c r4:857e4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84978c00 r8:854d322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec5e5d84 r8:00000002 r7:60000013 r6:ec5e5d8c r5:84978000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9dc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84978000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb813000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e478c r4:857e4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e478c r4:854d3280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84978000 r8:854d32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3280 r8:80287e08 r7:ec5b1e60 r6:854e3900 r5:84978000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9c40 INFO: task kworker/1:476:5695 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a08c5000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:5697 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5c9d84 r8:00000002 r7:60000113 r6:ec5c9d8c r5:8497a400 r4:8497a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857e4f8c r4:857e4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:5700 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f1d84 r8:00000002 r7:60000113 r6:ec5f1d8c r5:8497c800 r4:8497c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c8200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497c800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e538c r4:857e5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e538c r4:854d3300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497c800 r8:854d332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3300 r8:80287e08 r7:ec5c9e60 r6:854e3a00 r5:8497c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f1fb0 to 0xec5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred r4:857abc00 r4:00000000 r4:00000000 r5:857e5b8c r4:857e5800 r7:ddde2d80 r6:83018200 r5:857e5b8c r4:854d3380 r10:00000000 r9:854d3380 r8:80287e08 r7:ec5f1e60 r6:854d3400 r5:857abc00 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:5704 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:5704 tgid:5704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec55dd84 r8:00000002 r7:60000113 r6:ec55dd8c r5:857ac800 r4:857ac800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ac800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec55de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c8340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e578c r4:857e5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e578c r4:854d3480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ac800 r8:854d34ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3480 r8:80287e08 r7:ec5e1e60 r6:854d3500 r5:857ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec55dfb0 to 0xec55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8240 INFO: task kworker/1:480:5704 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a12fe000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 task:kworker/1:481 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f5e08 r5:00001000 r4:ebb87000 r5:857e6b8c r4:857e6800 r10:61c88647 r9:857ad400 r8:854d35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec621e08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c86c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e5f8c r4:857e5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e5f8c r4:854d3680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ae000 r8:854d36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3680 r8:80287e08 r7:ec5f5e60 r6:854d3700 r5:857ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec621fb0 to 0xec621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8640 INFO: task kworker/1:482:5709 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a194f000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred r5:857aec00 r4:8291a680 r4:00000000 r4:00000000 r5:857e638c r4:857e6000 r7:ddde2d80 r6:83018200 r5:857e638c r4:854d3780 9fa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:857aa400 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebb6d000 r5:857e678c r4:857e6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e678c r4:854d3880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857aa400 r8:854d38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3880 r8:80287e08 r7:ec5f5e60 r6:854d3900 r5:857aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8a00 INFO: task kworker/1:484:5712 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a21a8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857e778c r4:857e7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854d3980 r8:80287e08 r7:ec5f5e60 r6:854d3a00 r5:857ab000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:857a9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 r5:857e6f8c r4:857e6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e6f8c r4:854d3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a9800 r8:854d3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3a80 r8:80287e08 r7:ec629e60 r6:854d3b00 r5:857a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8d00 INFO: task kworker/1:486:5716 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a2639000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:857a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:857e738c r4:857e7000 r10:61c88647 r9:857a8c00 r8:854d3bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:5720 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec631d84 r8:00000002 r7:60000113 r6:ec631d8c r5:857a6c00 r4:857a6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e7b8c r4:857e7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e7b8c r4:854d3c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a6c00 r8:854d3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3c80 r8:80287e08 r7:ec629e60 r6:854d3d00 r5:857a6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec63dd84 r8:00000002 r7:60000113 r6:ec63dd8c r5:857b0000 r4:857b0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e7f8c r4:857e7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e7f8c r4:854d3d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b0000 r8:854d3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3d80 r8:80287e08 r7:ec631e60 r6:854d3e00 r5:857b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3100 INFO: task kworker/1:489:5722 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r9:83018205 r8:857b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:857ec38c r4:857ec000 r10:61c88647 r9:857b0c00 r8:854d3eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec639fb0 to 0xec639ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b0e300 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544f180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eef8c r4:857eec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eef8c r4:854d3f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497d400 r8:854d3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3f80 r8:80287e08 r7:ec639e60 r6:854e3a80 r5:8497d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec649fb0 to 0xec649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3400 INFO: task kworker/1:491:5726 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3254000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:5728 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:5728 tgid:5728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec651d84 r8:00000002 r7:60000113 r6:ec651d8c r5:8497ec00 r4:8497ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ec78c r4:857ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ec78c r4:85554000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497ec00 r8:8555402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554000 r8:80287e08 r7:ec649e60 r6:854e3b00 r5:8497ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b35c0 INFO: task kworker/1:492:5728 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3254000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:5730 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec659d84 r8:00000002 r7:60000113 r6:ec659d8c r5:8497e000 r4:8497e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8497e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r5:857ecb8c r4:857ec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ecb8c r4:85554080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497e000 r8:855540ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554080 r8:80287e08 r7:ec649e60 r6:854e3b80 r5:8497e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3940 INFO: task kworker/1:493:5730 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3c4c000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:5731 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:5731 tgid:5731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec65dd84 r8:00000002 r7:60000013 r6:ec65dd8c r5:8497b000 r4:8497b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8497b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 r5:857ecf8c r4:857ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ecf8c r4:85554100 r10:61c88647 r9:8497b000 r8:8555412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85554100 r8:80287e08 r7:ec649e60 r6:854e3c00 r5:8497b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3940 INFO: task kworker/1:494:5731 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3f73000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:5733 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec665d84 r8:00000002 r7:60000113 r6:ec665d8c r5:8497bc00 r4:8497bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ed38c r4:857ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ed38c r4:85554180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497bc00 r8:855541ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554180 r8:80287e08 r7:ec649e60 r6:854e3c80 r5:8497bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3780 INFO: task kworker/1:495:5733 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3f73000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:5735 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec66dd84 r8:00000002 r7:60000013 r6:ec66dd8c r5:8581bc00 r4:8581bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ed78c r4:857ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ed78c r4:85554200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581bc00 r8:8555422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554200 r8:80287e08 r7:ec649e60 r6:854e3d00 r5:8581bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3880 INFO: task kworker/1:496:5735 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a43aa000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:5737 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec67dd84 r8:00000002 r7:60000113 r6:ec67dd8c r5:84973000 r4:84973000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84973000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec67de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:857edb8c r4:857ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857edb8c r4:85554280 r10:61c88647 r9:84973000 r8:855542ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: a4750000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:5740 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec685d84 r8:00000002 r7:60000013 r6:ec685d8c r5:85828c00 r4:85828c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85828c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857edf8c r4:857edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857edf8c r4:85554300 r10:61c88647 r9:85828c00 r8:8555432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85829800 r5:85829800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85829800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ee38c r4:857ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ee38c r4:85554380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85829800 r8:855543ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554380 r8:80287e08 r7:ec649e60 r6:854e3e80 r5:85829800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3d00 INFO: task kworker/1:499:5741 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a51d9000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:5743 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec691d84 r8:00000002 r7:60000013 r6:ec691d8c r5:8582b000 r4:8582b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8582b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec691e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e0880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8582b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ee78c r4:857ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ee78c r4:85554400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8582b000 r8:8555442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554400 r8:80287e08 r7:ec649e60 r6:854e3f00 r5:8582b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3ec0 INFO: task kworker/1:500:5743 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eeb8c r4:857ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eeb8c r4:85554480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8582a400 r8:855544ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554480 r8:80287e08 r7:ec649e60 r6:854e3f80 r5:8582a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec69dfb0 to 0xec69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544f0c0 INFO: task kworker/1:501:5745 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a55b1000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:82ac21e4 r5:00001000 r4:e0447000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 Workqueue: events bpf_prog_free_deferred [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe043dd28 to 0xe043dd70) dd20: a55b1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe043dfb0 to 0xe043dff8) [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544f3c0 r5:857ef78c r4:857ef400 r4:00000001 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857eff8c r4:857efc00 r4:85554600 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a55b1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857efb8c r4:857ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8582e000 r8:855546ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:803:5759 blocked for more than 479 seconds. [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8584478c r4:85844400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec671fb0 to 0xec671ff8) INFO: task kworker/0:803:5759 is blocked on a mutex likely owned by task kworker/0:174:3633. dd20: a5efe000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:5763 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:5763 tgid:5763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec705d84 r8:00000002 r7:60000113 r6:ec705d8c r5:85010000 r4:85010000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85010000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857f078c r4:857f0400 r10:61c88647 r9:85010000 r8:8555472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: dd20: a619b000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec70dd84 r8:00000002 r7:60000013 r6:ec70dd8c r5:857b2400 r4:857b2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85844b8c r4:85844800 r10:00000000 r9:85446480 r8:80287e08 r7:ec701e60 r6:85554780 r5:857b2400 r5:800f0113 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred r9:83018205 r8:857b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r4:00000001 Call trace: r5:800f0113 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b0e300 r5:857b3000 r4:8291a680 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:857b3000 r8:8544652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446500 r8:80287e08 r7:ec701e60 r6:85554900 r5:857b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec719fb0 to 0xec719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8543d640 INFO: task kworker/0:806:5768 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a6918000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r5:800f0113 r4:80239bb0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85446580 INFO: task kworker/0:807:5770 is blocked on a mutex likely owned by task kworker/0:174:3633. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:85845f8c r4:85845c00 r10:00000000 r9:85446600 r8:80287e08 r7:ec719e60 r6:85554a00 r5:857b6000 dd20: a6d6b000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5774 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec709d84 r8:00000002 r7:60000113 r6:ec709d8c r5:857b6c00 r4:857b6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec709e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85845b8c r4:85845800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85446680 r8:80287e08 r7:ec721e60 r6:85554a80 r5:857b6c00 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 INFO: task kworker/1:508:5776 blocked for more than 479 seconds. r4:857b4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85554b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554b00 r8:80287e08 r7:ec705e60 r6:85554b80 r5:857b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec715fb0 to 0xec715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544f740 INFO: task kworker/1:508:5776 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a71e8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e043ddc0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:509:5779 blocked for more than 479 seconds. r4:85868000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec72de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857f0f8c r4:857f0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85554c00 r8:80287e08 r7:ec715e60 r6:85554c80 r5:85868000 Exception stack(0xec72dfb0 to 0xec72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c5c0 INFO: task kworker/1:509:5779 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a71e8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85868c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584638c r4:85846000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85868c00 r8:8544672c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:811 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8543dd40 INFO: task kworker/0:811:5782 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a79fc000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:5783 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:8586b000 r4:8586b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586b000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584738c r4:85847000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8584738c r4:85446800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586b000 r8:8544682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446800 r8:80287e08 r7:ec739e60 r6:85554e00 r5:8586b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec73dfb0 to 0xec73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8543dd40 INFO: task kworker/0:812:5783 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:84b4f38c r4:84b4f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec745e08 r9:83018005 r8:8586c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:85846b8c r4:85846800 r10:61c88647 r9:8586c800 r8:854468ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:814:5787 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:814 state:D stack:0 pid:5787 tgid:5787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec74dd84 r8:00000002 r7:60000013 r6:ec74dd8c r5:85869800 r4:85869800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85869800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec74de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85869800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85846f8c r4:85846c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85846f8c r4:85446900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85869800 r8:8544692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446900 r8:80287e08 r7:ec73de60 r6:85554f00 r5:85869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec74dfb0 to 0xec74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85458080 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e043ddc0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8586d400 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8584778c r4:85446980 r10:00000000 r9:85446980 r8:80287e08 r7:ec73de60 r6:85554f80 r5:8586d400 INFO: task kworker/0:815:5790 is blocked on a mutex likely owned by task kworker/0:174:3633. dd20: a8003000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:e043ddc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458540 r5:85847f8c r4:85847c00 r7:dddced80 r6:83018000 r5:85847f8c r4:85446a00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:817:5794 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:817 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000013 r6:ec75dd8c r5:8586ec00 r4:8586ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85847b8c r4:85847800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85847b8c r4:85446a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586ec00 r8:85446aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446a80 r8:80287e08 r7:ec759e60 r6:854b1080 r5:8586ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec75dfb0 to 0xec75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85458400 INFO: task kworker/0:817:5794 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a83ba000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8584838c r4:85848000 r7:dddced80 r6:83018000 r5:8584838c r4:85446b00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854584c0 INFO: task kworker/0:818:5796 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a8ae4000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)