Extracting prog: 6m49.152120384s Minimizing prog: 2h0m23.549385338s Simplifying prog options: 0s Extracting C: 8m38.916714483s Simplifying C: 58m10.295231695s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_route-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000001940)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200000002"], 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_route-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000001940)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200000002"], 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 5 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_route-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_route-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_route-bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_route-bpf$PROG_LOAD detailed listing: executing program 0: socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h14m1.91348974s repro crashed as (corrupted=false): INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cdf8c r4:858cdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858cdf8c r4:830b8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8600 r8:80287e08 r7:df83de60 r6:830b8700 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5a00 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/0:0:3098 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3098 tgid:3098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df999d84 r8:00000002 r7:60000113 r6:df999d8c r5:83883000 r4:83883000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83883000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df999e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83883000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c6b8c r4:858c6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c6b8c r4:83ffc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83883000 r8:83ffc52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ffc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ffc500 r8:80287e08 r7:ec5a1e60 r6:83ffc600 r5:83883000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf999fb0 to 0xdf999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83368540 INFO: task kworker/0:0:3098 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/0:4:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df981d84 r8:00000002 r7:60000013 r6:df981d8c r5:8387bc00 r4:8387bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c6f8c r4:858c6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c6f8c r4:84787a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387bc00 r8:84787aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84787a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787a80 r8:80287e08 r7:df961e60 r6:84787e80 r5:8387bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a4840 INFO: task kworker/0:4:3119 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/0:5:3121 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df979d84 r8:00000002 r7:60000113 r6:df979d8c r5:8387ec00 r4:8387ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c778c r4:858c7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c778c r4:84787f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387ec00 r8:84787f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84787f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787f00 r8:80287e08 r7:df981e60 r6:84787380 r5:8387ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a4840 INFO: task kworker/0:5:3121 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:6:3130 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:8430b000 r4:8430b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 INFO: task kworker/1:6:3130 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:7:3132 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:84309800 r4:84309800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84309800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84309800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509e38c r4:8509e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509e38c r4:847e6b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84309800 r8:847e6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b80 r8:80287e08 r7:df9f1e60 r6:847e6c00 r5:84309800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0500 INFO: task kworker/1:7:3132 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:8:3135 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9add84 r8:00000002 r7:60000113 r6:df9add8c r5:83243c00 r4:83243c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83243c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eda00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509f38c r4:8509f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509f38c r4:847e6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83243c00 r8:847e6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6c80 r8:80287e08 r7:dfa01e60 r6:847e6d00 r5:83243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9adfb0 to 0xdf9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ef440 INFO: task kworker/1:8:3135 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:9:3137 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83244800 r4:83244800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85157940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471878c r4:84718400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471878c r4:847e6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:847e6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6d80 r8:80287e08 r7:df9ade60 r6:847e6e00 r5:83244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479ae40 INFO: task kworker/1:9:3137 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:10:3138 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:83236000 r4:83236000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85205f8c r4:85205c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85205f8c r4:847e6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:847e6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6e80 r8:80287e08 r7:dfa19e60 r6:847e6f00 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d75200 INFO: task kworker/1:10:3138 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:11:3140 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:833a8c00 r4:833a8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833a8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d9700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471af8c r4:8471ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471af8c r4:847e6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833a8c00 r8:847e6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6f80 r8:80287e08 r7:df9fde60 r6:847e6900 r5:833a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9040 INFO: task kworker/1:11:3140 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:84116c00 r4:84116c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84116c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84116c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aab8c r4:851aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aab8c r4:847e6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84116c00 r8:847e68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6880 r8:80287e08 r7:dfa35e60 r6:847e6800 r5:84116c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9040 INFO: task kworker/1:12:3142 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3144 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:84110c00 r4:84110c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84110c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85314940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84110c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a978c r4:851a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a978c r4:847e6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84110c00 r8:847e67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6780 r8:80287e08 r7:dfa41e60 r6:847e6500 r5:84110c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9300 INFO: task kworker/1:13:3144 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:84114800 r4:84114800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84114800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84114800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ab78c r4:851ab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ab78c r4:847e6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84114800 r8:847e65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6580 r8:80287e08 r7:dfa41e60 r6:847e6600 r5:84114800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9400 INFO: task kworker/1:14:3146 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3148 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:84110000 r4:84110000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84110000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854144c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84110000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405878c r4:84058400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405878c r4:847e6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84110000 r8:847e66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6680 r8:80287e08 r7:dfa59e60 r6:847e6700 r5:84110000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9500 INFO: task kworker/1:15:3148 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3150 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:83395400 r4:83395400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83395400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853efdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83395400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405838c r4:84058000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405838c r4:847e6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83395400 r8:847e64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6480 r8:80287e08 r7:dfa65e60 r6:847e6400 r5:83395400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9780 INFO: task kworker/1:16:3150 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3152 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83393000 r4:83393000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83393000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555f6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83393000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c0b8c r4:855c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c0b8c r4:847e6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83393000 r8:847e632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6300 r8:80287e08 r7:dfa65e60 r6:847e6200 r5:83393000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b98c0 INFO: task kworker/1:17:3152 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3154 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:842fa400 r4:842fa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8971000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471bb8c r4:8471b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471bb8c r4:847e6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fa400 r8:847e62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6280 r8:80287e08 r7:dfa7de60 r6:847e6180 r5:842fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9ac0 INFO: task kworker/1:18:3154 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3156 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:842f9800 r4:842f9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842f9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0181000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854acb8c r4:854ac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854acb8c r4:847e6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842f9800 r8:847e612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6100 r8:80287e08 r7:dfa7de60 r6:847e6000 r5:842f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9b40 INFO: task kworker/1:19:3156 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3157 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:842fe000 r4:842fe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4893000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405938c r4:84059000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405938c r4:847e6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fe000 r8:847e60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6080 r8:80287e08 r7:dfa7de60 r6:83353500 r5:842fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9e40 INFO: task kworker/1:20:3157 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3160 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:842fc800 r4:842fc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca2bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c1f8c r4:855c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c1f8c r4:83353580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fc800 r8:833535ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83353580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83353580 r8:80287e08 r7:dfa7de60 r6:8336df00 r5:842fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9f40 INFO: task kworker/1:21:3160 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3162 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:842fec00 r4:842fec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3c400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c3b8c r4:855c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c3b8c r4:832a0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fec00 r8:832a002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0000 r8:80287e08 r7:dfab9e60 r6:847e5000 r5:842fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477be40 INFO: task kworker/1:22:3162 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3164 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:84183c00 r4:84183c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84183c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cab780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84183c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ee38c r4:855ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ee38c r4:847e5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84183c00 r8:847e50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5080 r8:80287e08 r7:dfac5e60 r6:847e5100 r5:84183c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d280 INFO: task kworker/1:23:3164 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3166 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:8330ec00 r4:8330ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8330ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85780a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ceb8c r4:856ce800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ceb8c r4:847e5180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8330ec00 r8:847e51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5180 r8:80287e08 r7:dfad1e60 r6:847e5200 r5:8330ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d400 INFO: task kworker/1:24:3166 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3167 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:8430a400 r4:8430a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430a400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eeb8c r4:855ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855eeb8c r4:847e5280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430a400 r8:847e52ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5280 r8:80287e08 r7:dfadde60 r6:830cc300 r5:8430a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d400 INFO: task kworker/1:25:3167 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3170 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:8430c800 r4:8430c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578ab40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571ab8c r4:8571a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571ab8c r4:847e5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430c800 r8:847e532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5300 r8:80287e08 r7:dfadde60 r6:830cc280 r5:8430c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d640 INFO: task kworker/1:26:3170 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3173 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:8430ec00 r4:8430ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c97c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571af8c r4:8571ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571af8c r4:847e5380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430ec00 r8:847e53ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5380 r8:80287e08 r7:dfafde60 r6:830cc400 r5:8430ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d800 INFO: task kworker/1:27:3173 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3174 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:8386e000 r4:8386e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405b78c r4:8405b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405b78c r4:847e5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386e000 r8:847e542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5400 r8:80287e08 r7:dfb19e60 r6:830cc380 r5:8386e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d800 INFO: task kworker/1:28:3174 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3176 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:8386b000 r4:8386b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a338c r4:858a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a338c r4:847e5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386b000 r8:847e54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5480 r8:80287e08 r7:dfb1de60 r6:8427bb80 r5:8386b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442db40 INFO: task kworker/1:29:3176 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3177 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:8386d400 r4:8386d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85866ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386d400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0635000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582578c r4:85825400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582578c r4:847e5500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386d400 r8:847e552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5500 r8:80287e08 r7:dfb2de60 r6:8427bb00 r5:8386d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442da40 INFO: task kworker/1:30:3177 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3180 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:8386a400 r4:8386a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85934f8c r4:85934c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85934f8c r4:847e5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386a400 r8:847e562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5600 r8:80287e08 r7:dfb2de60 r6:844f1e00 r5:8386a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442dc40 INFO: task kworker/1:31:3180 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3181 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84308000 r4:84308000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84308000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84308000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405bb8c r4:8405b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405bb8c r4:847e5680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84308000 r8:847e56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5680 r8:80287e08 r7:dfb4de60 r6:844f1c80 r5:84308000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442df00 INFO: task kworker/1:32:3181 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3183 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83bc0c00 r4:83bc0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83bc0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83bc0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472078c r4:84720400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472078c r4:847e5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83bc0c00 r8:847e57ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5780 r8:80287e08 r7:dfb4de60 r6:844f1d80 r5:83bc0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442dc40 INFO: task kworker/1:33:3183 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3186 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb7dd84 r8:00000002 r7:60000013 r6:dfb7dd8c r5:83bc2400 r4:83bc2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83bc2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83bc2400 r7:00000000 r6:83018200 r5:00001000 r4:7f1f5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593778c r4:85937400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593778c r4:847e5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83bc2400 r8:847e582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5800 r8:80287e08 r7:dfb4de60 r6:844f1c00 r5:83bc2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844801c0 INFO: task kworker/1:34:3186 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3188 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:83308c00 r4:83308c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83308c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d46c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593578c r4:85935400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593578c r4:847e5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83308c00 r8:847e58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5880 r8:80287e08 r7:dfb7de60 r6:847e5900 r5:83308c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480240 INFO: task kworker/1:35:3188 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:8330d400 r4:8330d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8330d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fab00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1f7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85937b8c r4:85937800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85937b8c r4:847e5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8330d400 r8:847e59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5980 r8:80287e08 r7:dfb7de60 r6:847e5a00 r5:8330d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480240 INFO: task kworker/1:36:3189 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:844c8000 r4:844c8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f1f3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593738c r4:85937000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593738c r4:847e5a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c8000 r8:847e5aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5a80 r8:80287e08 r7:dfb7de60 r6:847e5b00 r5:844c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480580 INFO: task kworker/1:37:3192 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3194 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba1d84 r8:00000002 r7:60000013 r6:dfba1d8c r5:844c8c00 r4:844c8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1f1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85936f8c r4:85936c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85936f8c r4:847e5b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c8c00 r8:847e5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5b80 r8:80287e08 r7:dfb89e60 r6:847e5c00 r5:844c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480580 INFO: task kworker/1:38:3194 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3196 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:844ca400 r4:844ca400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844ca400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f1ef000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb891000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85936b8c r4:85936800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85936b8c r4:847e5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ca400 r8:847e5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5c80 r8:80287e08 r7:dfba1e60 r6:847e5d00 r5:844ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844808c0 INFO: task kworker/1:39:3196 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3198 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc1d84 r8:00000002 r7:60000013 r6:dfbc1d8c r5:844cbc00 r4:844cbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844cbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853748c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f1e9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0fb8c r4:85a0f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0fb8c r4:847e5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844cbc00 r8:847e5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5d80 r8:80287e08 r7:dfbb5e60 r6:847e5e00 r5:844cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480b40 INFO: task kworker/1:40:3198 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83bc3c00 r4:83bc3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83bc3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83bc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1ed000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593678c r4:85936400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593678c r4:847e5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83bc3c00 r8:847e5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5e80 r10:00000000 r9:847e5e80 r8:80287e08 r7:dfbc1e60 r6:83364c00 r5:83bc3c00 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:842f8c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8593638c r4:85936000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847e5f00 r8:80287e08 r7:dfbc1e60 r6:83364b80 r5:842f8c00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1f5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb497000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859aa78c r4:859aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859aa78c r4:847e5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e40c00 r8:847e5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5f80 r8:80287e08 r7:dfbc1e60 r6:830b8480 r5:84e40c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a4700 INFO: task kworker/1:43:3205 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:844c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f2b3000 r5:859aaf8c r4:859aac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:844cc800 r4:844cc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844cc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c738c r4:858c7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c738c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844cc800 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:df979e60 r6:84ccc080 r5:844cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce4c0 INFO: task kworker/0:6:3208 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe060dd28 to 0xe060dd70) r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:45:3211 blocked for more than 451 seconds. r5:844cd400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859aab8c r4:859aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ccc100 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d84100 INFO: task kworker/1:45:3211 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:844cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:85b5578c r4:85b55400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ccc200 r8:80287e08 r7:dfbf1e60 r6:84ccc280 r5:844cec00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854e138c r4:854e1000 r10:61c88647 r9:844cb000 r8:84ccc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:844d8000 r4:844d8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590aa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c7b8c r4:858c7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c7b8c r4:84e4b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d8000 r8:84e4b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b000 r8:80287e08 r7:df979e60 r6:84ccc480 r5:844d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce780 INFO: task kworker/0:7:3217 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3219 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:844d9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r5:00001000 r4:ec89d000 r5:85b3578c r4:85b35400 r7:ddde2d80 r6:83018200 r5:85b3578c r4:84ccc500 r10:00000000 r9:84ccc500 r8:80287e08 r7:dfc15e60 r6:84ccc580 r5:844d9800 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:8:3221 blocked for more than 451 seconds. r4:844db000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r5:00001000 r4:ec8d7000 r5:858cf78c r4:858cf400 r7:dddced80 r6:83018000 r5:858cf78c r4:84e4b080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3222 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:844d8c00 r4:844d8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590ab40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c7f8c r4:858c7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c7f8c r4:84e4b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d8c00 r8:84e4b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b100 r8:80287e08 r7:dfc59e60 r6:84ccc680 r5:844d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce940 INFO: task kworker/0:9:3222 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858cc38c r4:858cc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfc6dfb0 to 0xdfc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ccea40 INFO: task kworker/0:10:3223 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3226 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc7dd84 r8:00000002 r7:60000113 r6:dfc7dd8c r5:844dd400 r4:844dd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858ccb8c r4:858cc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84e4b200 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebc65000 r5:858ccf8c r4:858ccc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844de000 r8:84e4b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b280 r8:80287e08 r7:dfc59e60 r6:84ccc800 r5:844de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cced40 INFO: task kworker/0:12:3228 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858cd38c r4:858cd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84e4b300 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b49b8c r4:85b49800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3234 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:844dbc00 r4:844dbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85391fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f327000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5478c r4:85b54400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5478c r4:84ccc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dbc00 r8:84ccc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccc900 r8:80287e08 r7:dfc15e60 r6:84ccc980 r5:844dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d84d00 INFO: task kworker/1:50:3234 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85b57b8c r4:84ccca00 r10:00000000 r9:84ccca00 r8:80287e08 r7:dfc15e60 r6:84ccca80 r5:844dec00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3239 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfccdd84 r8:00000002 r7:60000013 r6:dfccdd8c r5:844da400 r4:844da400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844da400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844da400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cd78c r4:858cd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858cd78c r4:84e4b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844da400 r8:84e4b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b480 r8:80287e08 r7:dfc59e60 r6:84cccb00 r5:844da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f9080 INFO: task kworker/0:14:3239 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 task:kworker/1:52 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc1d84 r8:00000002 r7:60000113 r6:dfcc1d8c r5:844ce000 r4:844ce000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844ce000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540bd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f4ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed607000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5778c r4:85b57400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5778c r4:84cccb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ce000 r8:84cccbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cccb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cccb80 r8:80287e08 r7:dfc89e60 r6:84cccc00 r5:844ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d83200 INFO: task kworker/1:52:3240 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:53:3243 blocked for more than 451 seconds. r5:84180c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85c6038c r4:85c60000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c6038c r4:84cccc80 r10:00000000 r9:84cccc80 r8:80287e08 r7:dfc89e60 r6:84cccd00 r5:84180c00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3245 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84e18000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r9:83018205 r8:84e18000 r7:00000000 r6:83018200 r5:00001000 r4:7f555000 r5:85c6d78c r4:85c6d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84cccd80 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r9:83018205 r8:84e18c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5d1000 r5:8472a78c r4:8472a400 r7:ddde2d80 r6:83018200 r5:8472a78c r4:84ccce80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3248 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf1d84 r8:00000002 r7:60000113 r6:dfcf1d8c r5:84e19800 r4:84e19800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e19800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e19800 r7:00000000 r6:83018200 r5:00001000 r4:7f4f1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6ff8c r4:85c6fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c6ff8c r4:84cccf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e19800 r8:84cccfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cccf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cccf80 r8:80287e08 r7:dfcfde60 r6:84ccc400 r5:84e19800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d83440 INFO: task kworker/1:56:3248 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:57:3251 blocked for more than 451 seconds. r4:84e1a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8578ef8c r4:8578ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1a400 r8:842e702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7000 r8:80287e08 r7:dfcfde60 r6:842e7080 r5:84e1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d83980 INFO: task kworker/1:57:3251 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd19d84 r8:00000002 r7:60000013 r6:dfd19d8c r5:84e1b000 r4:84e1b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e1b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85df90c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e1b000 r7:00000000 r6:83018200 r5:00001000 r4:7f793000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d9138c r4:85d91000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 80000013 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe060dfb0 to 0xe060dff8) r10:8291a684 r9:dfd0dd84 r8:00000002 r7:60000113 r6:dfd0dd8c r5:84e1bc00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d18ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f64d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472af8c r4:8472ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472af8c r4:842e7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1bc00 r8:842e722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7200 r8:80287e08 r7:dfd19e60 r6:842e7280 r5:84e1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3ef8c r4:85d3ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d3ef8c r4:842e7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1c800 r8:842e732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7300 r8:80287e08 r7:dfd19e60 r6:842e7380 r5:84e1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfc25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3258 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84e1d400 r4:8291a680 r5:00001000 r4:ed9bf000 r5:85b6138c r4:85b61000 r10:61c88647 r9:84e1d400 r8:842e742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:62:3260 blocked for more than 451 seconds. [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d5578c r4:85d55400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d5578c r4:842e7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1ec00 r8:842e752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7500 r8:80287e08 r7:dfd19e60 r6:842e7580 r5:84e1ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd49fb0 to 0xdfd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:844e0c00 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921600 r7:dddced80 r6:83018000 r5:858ce78c r4:84e4b500 Exception stack(0xdfd59fb0 to 0xdfd59ff8) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3265 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd55d84 r8:00000002 r7:60000113 r6:dfd55d8c r5:844e0000 r4:844e0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844e0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed6b5000 r5:85d65f8c r4:85d65c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d65f8c r4:842e7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844e0000 r8:842e76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7680 r8:80287e08 r7:dfd19e60 r6:842e7700 r5:844e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd55fb0 to 0xdfd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e4e500 INFO: task kworker/1:63:3265 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 r4:82ac21e4 r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:64:3267 blocked for more than 451 seconds. r5:844e2400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d90f8c r4:85d90c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:844e3000 r4:00000000 r4:00000000 r5:85d90b8c r4:85d90800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844e3000 r8:842e78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85d9078c r4:85d90400 r7:ddde2d80 r6:83018200 r5:85d9078c r4:842e7980 Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:3273 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:844e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f879000 r5:8473ab8c r4:8473a800 r7:ddde2d80 r6:83018200 r5:8473ab8c r4:842e7a80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:3274 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:844e5400 r4:844e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e0e480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d9b78c r4:85d9b400 r10:61c88647 r9:844e5400 r8:842e7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:844e6000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84739f8c r4:84739c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84739f8c r4:842e7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844e6000 r8:842e7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7c80 r8:80287e08 r7:df9c9e60 r6:842e7d00 r5:844e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca6000 INFO: task kworker/1:69:3278 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r5:00001000 r4:dfc25000 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:3280 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:844e6c00 r4:844e6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844e6c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r5:00001000 r4:ed9e5000 r5:8473a38c r4:8473a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844e6c00 r8:842e7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:844e1800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca6d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f87b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9b7000 r5:8473a78c r4:8473a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3284 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:84e1e000 r4:84e1e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e1e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e445c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f877000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed913000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8473af8c r4:8473ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8473af8c r4:842e7f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1e000 r8:842e7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe060dd28 to 0xe060dd70) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e44780 r9:83018205 r8:84cd0000 r7:00000000 r6:83018200 r5:00001000 r4:7f875000 r5:8473b38c r4:8473b000 r10:61c88647 r9:84cd0000 r8:84cac0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca6480 INFO: task kworker/1:73:3286 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:8506c000 r4:84cd0c00 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8473b78c r4:84cac180 Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:75 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:84cd1800 r4:84cd1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cd1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8473bb8c r4:8473b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8473bb8c r4:84cac280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cd1800 r8:84cac2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cac280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cac280 r8:80287e08 r7:dfa61e60 r6:84cac300 r5:84cd1800 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84fdf38c r4:84fdf000 r4:8506c000 r5:84e43000 r4:8291a680 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:77:3293 blocked for more than 451 seconds. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8473bf8c r4:8473bc00 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85d9bf8c r4:85d9bc00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3297 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84e43c00 r4:84e43c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e43c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca6e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f86b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed781000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dc4b8c r4:84dc4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dc4b8c r4:84cac500 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 Exception stack(0xe060dfb0 to 0xe060dff8) r4:84e46000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84e46000 r8:84cac5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe060dd28 to 0xe060dd70) r5:00001000 r4:dfc25000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:858ceb8c r4:84e4b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e41800 r8:84e4b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b800 r8:80287e08 r7:dfc59e60 r6:84e4b880 r5:84e41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cbc0c0 INFO: task kworker/0:16:3301 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e060ddc0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84dc538c r4:84dc5000 r10:61c88647 r9:84cd2400 r8:84cac62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cac600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cac600 r8:80287e08 r7:dfb25e60 r6:84cac680 r5:84cd2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb51c0 Workqueue: events bpf_prog_free_deferred r4:e060ddc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:82 state:D stack:0 pid:3306 tgid:3306 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb5000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ea7f8c r4:85ea7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ea7f8c r4:84cac700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cd3c00 r8:84cac72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cac700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb51c0 INFO: task kworker/1:82:3306 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:85f2b78c r4:85f2b400 r10:61c88647 r9:84cd5400 r8:84cac82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe060dd28 to 0xe060dd70) r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84cd4800 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84dc5b8c r4:84dc5800 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 Exception stack(0xe060dfb0 to 0xe060dff8) r4:840ee000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:840ee000 r8:84e2d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) Exception stack(0xe060dfb0 to 0xe060dff8) r5:84cd6c00 r4:8291a680 r5:00001000 r4:ee84b000 r5:8600e78c r4:8600e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8600e78c r4:84e2d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cd6c00 r8:84e2d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e2d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e2d280 r8:80287e08 r7:dfde9e60 r6:84e2d300 r5:84cd6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde1fb0 to 0xdfde1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e27c00 INFO: task kworker/1:102:3349 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:8506c000 r5:85005400 r4:8291a680 r9:83018205 r8:85005400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:84f7a38c r4:84f7a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f7a38c r4:84e90300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85005400 r8:84e9032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e90300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e90300 r8:80287e08 r7:e0551e60 r6:84eed280 r5:85005400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe056dfb0 to 0xe056dff8) dfa0: 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3709 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3709 tgid:3709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85006c00 r4:00000000 r5:84f79f8c r4:84f79c00 r10:61c88647 r9:85006c00 r8:84e903ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe060dd28 to 0xe060dd70) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Not tainted 6.15.0-rc7-syzkaller #0 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fdff8c r4:84fdfc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84fdf78c r4:84fdf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf78c r4:84d91900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f76c00 r8:84d9192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91900 r8:80287e08 r7:e05fde60 r6:84fed580 r5:84f76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c240 INFO: task kworker/0:202:3790 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85036000 r4:00000000 r5:84f7bb8c r4:84f7b800 r10:61c88647 r9:85036000 r8:84fed62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 task:kworker/1:136 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84f7a78c r4:84f7a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe060dd28 to 0xe060dd70) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:84fdfb8c r4:84fdf800 Exception stack(0xe0619fb0 to 0xe0619ff8) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:84d91880 r4:8506c000 r4:84d18c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe0f8c r4:84fe0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe0f8c r4:84d91a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d18c00 r8:84d91a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91a00 r8:80287e08 r7:e05fde60 r6:84fed880 r5:84d18c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c700 INFO: task kworker/0:204:3799 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 Exception stack(0xe060dfb0 to 0xe060dff8) r5:84d19800 r4:8291a680 r9:83018005 r8:84d19800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r4:84d91a80 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:84d1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1a400 r8:84d91b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91b00 r8:80287e08 r7:e0631e60 r6:84fed980 r5:84d1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c940 INFO: task kworker/0:206:3803 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-rc7-syzkaller #0 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe0b8c r4:84fe0800 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84fe178c r4:84fe1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe178c r4:84d91c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1bc00 r8:84d91c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91c00 r8:80287e08 r7:e0631e60 r6:84feda80 r5:84d1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe138c r4:84fe1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe138c r4:84d91c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1e000 r8:84d91cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91c80 r8:80287e08 r7:e0659e60 r6:84fedb00 r5:84d1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0681fb0 to 0xe0681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506cd40 INFO: task kworker/0:209:3810 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:8291a684 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84d1ec00 r5:84fe238c r4:84fe2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:84fe1b8c r4:84fe1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe1b8c r4:84d91d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1c800 r8:84d91dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91d80 r8:80287e08 r7:e069de60 r6:84fedc00 r5:84d1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506cdc0 INFO: task kworker/0:211:3813 is blocked on a mutex likely owned by task kworker/0:201:3787. Workqueue: events bpf_prog_free_deferred [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 INFO: task kworker/0:212:3815 blocked for more than 451 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r5:84fe1f8c r4:84fe1c00 r4:84d91e00 r4:8506e100 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:84d91880 r4:8506c000 r5:85039800 r4:8291a680 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85039800 r8:84d91eac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506e1c0 INFO: task kworker/0:213:3818 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8291a684 r9:e06bdd84 r8:00000002 r7:60000113 r6:e06bdd8c r5:8503a400 r5:84fe2b8c r4:84fe2800 r10:61c88647 r9:8503a400 r8:84d91f2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe060dd28 to 0xe060dd70) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506e1c0 INFO: task kworker/0:215:3821 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:216:3822 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c9d84 r8:00000002 r7:60000013 r6:e06c9d8c r5:8503bc00 r4:8503bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r5:84fe2f8c r4:84fe2c00 r7:dddced80 r6:83018000 r5:84fe2f8c r4:8507a000 r4:00000001 r4:8506e480 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3824 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e059dd84 r8:00000002 r7:60000113 r6:e059dd8c r5:8500c800 r4:8500c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84fe338c r4:84fe3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe338c r4:8507a080 r4:8507a080 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 task:kworker/0:218 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe378c r4:84fe3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:84fdf38c r4:84fdf000 Exception stack(0xe060dfb0 to 0xe060dff8) Workqueue: events bpf_prog_free_deferred r4:8500ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ec80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8500ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe3f8c r4:84fe3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe3f8c r4:8507a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500ec00 r8:8507a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506e8c0 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe878c r4:84fe8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8507a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a380 r8:80287e08 r7:e06d5e60 r6:8507a400 r5:8500d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506eb00 INFO: task kworker/0:220:3832 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe060dfb0 to 0xe060dff8) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8500bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df959000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe838c r4:84fe8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe838c r4:8507a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500bc00 r8:8507a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a480 r8:80287e08 r7:e06d9e60 r6:8507a500 r5:8500bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8500b000 r4:8291a680 r9:83018005 r8:8500b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 r7:dddced80 r6:83018000 r5:84fe8f8c r4:8507a580 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:3837 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:84fe8b8c r4:84fe8800 Exception stack(0xe00e1fb0 to 0xe00e1ff8) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84c51800 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c51800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe938c r4:84fe9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe938c r4:8507a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c51800 r8:8507a7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a780 r8:80287e08 r7:e00d5e60 r6:8507a800 r5:84c51800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f9fb0 to 0xe00f9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:850891c0 dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8291a684 r9:e0111d84 r8:00000002 r7:60000113 r6:e0111d8c r5:84d00000 r5:84fe978c r4:84fe9400 r10:00000000 r9:8507a880 r8:80287e08 r7:e00f9e60 r6:8507a900 r5:84d00000 dd60: 80230ad0 80239bb0 80000013 ffffffff r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:84d01800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r10:61c88647 r9:84d01800 r8:8507a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a980 r8:80287e08 r7:e0111e60 r6:8507aa00 r5:84d01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089100 INFO: task kworker/0:226:3843 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3845 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3845 tgid:3845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0129d84 r8:00000002 r7:60000113 r6:e0129d8c r5:84d02400 r4:84d02400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d02400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0129e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850897c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d02400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe9f8c r4:8507aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d02400 r8:8507aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507aa80 r8:80287e08 r7:e0669e60 r6:8507ab00 r5:84d02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0129fb0 to 0xe0129ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0141e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84feab8c r4:84fea800 r4:8507ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507ab80 r8:80287e08 r7:e0129e60 r6:8507ac00 r5:84d03000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0141fb0 to 0xe0141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089640 INFO: task kworker/0:228:3847 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:229:3848 blocked for more than 452 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfed3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84fea38c r4:8507ac80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:230 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8507ad80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3853 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06edd84 r8:00000002 r7:60000113 r6:e06edd8c r5:84d05400 r4:84d05400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d05400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d05400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0101000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84feaf8c r4:84feac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84feaf8c r4:8507ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d05400 r8:8507aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507ae80 r8:80287e08 r7:e0141e60 r6:8507af00 r5:84d05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089ac0 INFO: task kworker/0:231:3853 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3855 blocked for more than 452 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84feb38c r4:84feb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84feb38c r4:8507af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d06000 r8:8507afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507af80 r8:80287e08 r7:e06ede60 r6:850d9000 r5:84d06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089c40 INFO: task kworker/0:232:3855 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:84d06c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:234:3860 blocked for more than 452 seconds. r4:84d00c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d00c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0175000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84febb8c r4:84feb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84febb8c r4:850d9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d00c00 r8:850d91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9180 r8:80287e08 r7:e06f5e60 r6:850d9200 r5:84d00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd080 INFO: task kworker/0:234:3860 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850d9280 r8:80287e08 r7:e06f9e60 r6:850d9300 r5:85018000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85018c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509c38c r4:8509c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509c38c r4:850d9380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018c00 r8:850d93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9380 r8:80287e08 r7:e06fde60 r6:850d9400 r5:85018c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd180 INFO: task kworker/0:236:3863 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3865 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3865 tgid:3865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0701d84 r8:00000002 r7:60000013 r6:e0701d8c r5:85019800 r4:85019800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85019800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85019800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509cb8c r4:8509c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509cb8c r4:850d9480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85019800 r8:850d94ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9480 r8:80287e08 r7:e06e9e60 r6:850d9500 r5:85019800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0701fb0 to 0xe0701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd180 INFO: task kworker/0:237:3865 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e01b9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501a400 r8:850d95ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3869 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0711d84 r8:00000002 r7:60000013 r6:e0711d8c r5:8501b000 r4:8501b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd940 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509cf8c r4:8509cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe0711fb0 to 0xe0711ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e05cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501bc00 r8:850d982c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ddc40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509d78c r4:8509d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509d78c r4:850d9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501c800 r8:850d97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9780 r8:80287e08 r7:e0715e60 r6:850d9900 r5:8501c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0719fb0 to 0xe0719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd8c0 INFO: task kworker/0:241:3873 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3875 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:8501e000 r4:8501e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (_ <> orker/0:992 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c1d84 r8:00000002 r7:60000113 r6:ec6c1d8c r5:84ffa400 r4:84ffa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffa400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582af8c r4:8582ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582af8c r4:8586b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffa400 r8:8586b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b280 r8:80287e08 r7:ec6b9e60 r6:8586b300 r5:84ffa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c1fb0 to 0xec6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85867340 INFO: task kworker/0:992:5767 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 818df000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:993:5769 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:993 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c9d84 r8:00000002 r7:60000113 r6:ec6c9d8c r5:84ffb000 r4:84ffb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffb000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b78c r4:8582b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b78c r4:8586b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffb000 r8:8586b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b380 r8:80287e08 r7:ec6c1e60 r6:8586b400 r5:84ffb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 81b79000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84ffbc00 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b38c r4:8582b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b38c r4:8586b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffbc00 r8:8586b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r5:84fdef8c r4:84fdec00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:995:5772 blocked for more than 474 seconds. r4:84ffc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:5774 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e1d84 r8:00000002 r7:60000113 r6:ec6e1d8c r5:84ffe000 r4:84ffe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c86580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ffe000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a238c r4:858a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a238c r4:8585b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffe000 r8:8585b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8585b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585b980 r8:80287e08 r7:ec64de60 r6:8586b680 r5:84ffe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e1fb0 to 0xec6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bf8c r4:8582bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582bf8c r4:8586b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d8000 r8:8586b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b700 r8:80287e08 r7:ec6c5e60 r6:8585ba00 r5:857d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d1fb0 to 0xec6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec6e5d84 r8:00000002 r7:60000013 r6:ec6e5d8c r5:857d8c00 r7:dddced80 r6:83018000 r5:858bc38c r4:8586b780 r10:00000000 r9:8586b780 r8:80287e08 r7:ec6d1e60 r6:8585ba80 r5:857d8c00 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8585bb00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8262a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c863c0 INFO: task kworker/1:321:5782 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 82961000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:847e6b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r7:dddced80 r6:83018000 r5:858bc78c r4:8586b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Call trace: r10:8291a684 r9:ec721d84 r8:00000002 r7:60000113 r6:ec721d8c r5:857dc800 r4:857dc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857dc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec721e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec71d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bcb8c r4:858bc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bcb8c r4:8586b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857dc800 r8:8586b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b880 r8:80287e08 r7:ec719e60 r6:8585bd80 r5:857dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec721fb0 to 0xec721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586e100 INFO: task kworker/0:999:5786 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 82b6b000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:857dd400 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec72de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec729000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bcf8c r4:858bcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bcf8c r4:8586b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:1001:5790 blocked for more than 474 seconds. Call trace: r5:857d9800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e580 r5:858bd38c r4:858bd000 r7:dddced80 r6:83018000 r5:858bd38c r4:8586b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d9800 r8:8586b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b980 r8:80287e08 r7:ec72de60 r6:8585be80 r5:857d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec749fb0 to 0xec749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586e300 INFO: task kworker/0:1001:5790 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 830f5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1002:5792 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1002 state:D stack:0 pid:5792 tgid:5792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec759d84 r8:00000002 r7:60000113 r6:ec759d8c r5:857dec00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8586ba00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 830f5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 r4:00000001 INFO: task kworker/0:1003:5793 blocked for more than 474 seconds. Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000113 r6:ec75dd8c r5:857eec00 r4:857eec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857eec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586ed80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858beb8c r4:8586ba80 r4:8586ba80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 83393000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:858bdb8c r4:8586bb00 r4:8586bb00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:5798 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec78dd84 r8:00000002 r7:60000113 r6:ec78dd8c r5:85851800 r4:85851800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85851800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec78de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85851800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec76d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bdf8c r4:858bdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bdf8c r4:8586bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85851800 r8:8586bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586bb80 r8:80287e08 r7:ec75de60 r6:858f6080 r5:85851800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec78dfb0 to 0xec78dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1006:5799 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1006 state:D stack:0 pid:5799 tgid:5799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec791d84 r8:00000002 r7:60000013 r6:ec791d8c r5:85850000 r4:85850000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85850000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858be38c r4:8586bc00 r4:00000001 INFO: task kworker/0:1006:5799 is blocked on a mutex likely owned by task kworker/1:6:3130. 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:5801 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6edd84 r8:00000002 r7:60000113 r6:ec6edd8c r5:84ffec00 r4:84ffec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586ec00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec789000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858be78c r4:858be400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858be78c r4:8586bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffec00 r8:8586bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586bc80 r8:80287e08 r7:ec75de60 r6:8586bd00 r5:84ffec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6edfb0 to 0xec6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec795d84 r8:00000002 r7:60000013 r6:ec795d8c r5:84ffd400 r4:84ffd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec795e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bf38c r4:858bf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bf38c r4:8586bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffd400 r8:8586bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xec795fb0 to 0xec795ff8) INFO: task kworker/0:1008:5804 is blocked on a mutex likely owned by task kworker/1:6:3130. 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bef8c r4:8586be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f0000 r8:8586beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586be80 r8:80287e08 r7:ec795e60 r6:8586bf00 r5:857f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec731fb0 to 0xec731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586eb80 INFO: task kworker/0:1009:5805 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8409e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:1010 state:D stack:0 pid:5808 tgid:5808 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902040 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:1010:5808 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8409e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:857f1800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857f1800 r8:859000ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85900080 r8:80287e08 r7:ec7ade60 r6:85900100 r5:857f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7edfb0 to 0xec7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859021c0 INFO: task kworker/0:1011:5811 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 845d9000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec7f9fb0 to 0xec7f9ff8) Call trace: 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r5:857f3000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902480 r4:85900280 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1014:5815 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1014 state:D stack:0 pid:5815 tgid:5815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec811d84 r8:00000002 r7:60000013 r6:ec811d8c r5:857f4800 r4:857f4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec811e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858c478c r4:858c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857f4800 r8:859003ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xec811fb0 to 0xec811ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85902440 INFO: task kworker/0:1014:5815 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 84b40000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:5818 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec831d84 r8:00000002 r7:60000113 r6:ec831d8c r5:857f6000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:858a2f8c r4:858a2c00 r4:858f6180 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r5:00001000 r4:dfbf9000 1fa0: 00000000 00000000 00000000 00000000 r4:857f6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec839e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8442dd00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405bf8c r4:8405bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8405bf8c r4:85900500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f6c00 r8:8590052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900500 r8:80287e08 r7:ec811e60 r6:85900580 r5:857f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec839fb0 to 0xec839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85902880 INFO: task kworker/0:1015:5820 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r5:84fdef8c r4:84fdec00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:858c4b8c r4:858c4800 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1017:5829 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1017 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7cdd84 r8:00000002 r7:60000013 r6:ec7cdd8c r5:84d11800 r4:84d11800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d11800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902a40 r4:00000000 r9:83018005 r8:84d11800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:858c4f8c r4:858c4c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85902d80 Call trace: 1d20: 857a6000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:5831 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec825d84 r8:00000002 r7:60000113 r6:ec825d8c r5:84d12400 r4:84d12400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d12400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c538c r4:858c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c538c r4:85900800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d12400 r8:8590082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900800 r8:80287e08 r7:ec7cde60 r6:85900880 r5:84d12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85902f00 Workqueue: events bpf_prog_free_deferred 1d20: 85bee000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85854800 r4:8291a680 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85854800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a3b8c r4:858a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a3b8c r4:858f6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85854800 r8:858f622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6200 r8:80287e08 r7:ec6dde60 r6:858f6280 r5:85854800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85877180 INFO: task kworker/1:323:5832 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d20: 85f5b000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:85855400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:858a3f8c r4:858a3c00 r10:61c88647 r9:85855400 r8:858f632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:859040c0 INFO: task kworker/1:324:5833 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 86301000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:5835 blocked for more than 475 seconds. task:kworker/1:325 state:D stack:0 pid:5835 tgid:5835 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 r5:8593438c r4:85934000 r7:ddde2d80 r6:83018200 r5:8593438c r4:858f6400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1019:5836 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1019 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec85dd84 r8:00000002 r7:60000113 r6:ec85dd8c r5:85852400 r4:85852400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85852400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85852400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:858c578c r4:858c5400 r10:61c88647 r9:85852400 r8:8590092c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442dd80 INFO: task kworker/0:1019:5836 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 86b3c000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:84fdef8c r4:84fdec00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r9:83018205 r8:85853000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 r5:858cf38c r4:858cf000 r4:00000001 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb635000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c5b8c r4:858c5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:85900a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85853c00 r8:85900a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900a00 r8:80287e08 r7:ec869e60 r6:858f6700 r5:85853c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8590a100 INFO: task kworker/0:1021:5841 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85100000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:85900a80 r4:8590a040 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1023:5844 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1023 state:D stack:0 pid:5844 tgid:5844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec87dd84 r8:00000002 r7:60000013 r6:ec87dd8c r5:85101800 r4:85101800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85101800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85101800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb779000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85101800 r8:85900b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8590a240 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:84fdef8c r4:84fdec00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) task:kworker/0:1024 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d13000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c678c r4:858c6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c678c r4:85900b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d13000 r8:85900bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900b80 r8:80287e08 r7:ec869e60 r6:85900c00 r5:84d13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:00001000 r4:dfbf9000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r5:84d16000 r4:8291a680 r4:00000000 r10:61c88647 r9:84d16000 r8:858f68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592d0c0 INFO: task kworker/1:327:5868 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: 882f6000 eca77000 00000001 80239b98 7f1eb000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 INFO: task kworker/1:328:5927 blocked for more than 475 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d9c0 r5:8593478c r4:85934400 r7:ddde2d80 r6:83018200 r5:8593478c r4:858f6900 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:5928 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8bdd84 r8:00000002 r7:60000113 r6:ec8bdd8c r5:85102400 r4:85102400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85102400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592dbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85102400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85934b8c r4:85934800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85934b8c r4:858f6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85102400 r8:858f6a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6a00 r8:80287e08 r7:ec8fde60 r6:858f6a80 r5:85102400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8bdfb0 to 0xec8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592d740 INFO: task kworker/1:329:5928 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df9f1dc0 r5:84fdef8c r4:84fdec00 r4:00000001 r4:847d0740 r4:85106000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4c80 r7:ddde2d80 r6:83018200 r5:85935f8c r4:858f6b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 88b65000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:8593538c r4:858f6c00 5fa0: 00000000 00000000 00000000 00000000 r4:8592da40 INFO: task kworker/1:331:5931 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 88ebe000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d43c0 r9:83018205 r8:85100c00 r7:00000000 r6:83018200 r5:00001000 r4:7f161000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85935b8c r4:85935800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85935b8c r4:858f6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85100c00 r8:858f6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6d00 r8:80287e08 r7:ec83de60 r6:858f6d80 r5:85100c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85111600 INFO: task kworker/1:332:5960 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8979e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r9:83018205 r8:85103c00 r7:00000000 r6:83018200 r5:00001000 r4:7f163000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85309b8c r4:85309800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85309b8c r4:858f6e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85103c00 r8:858f6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6e00 r8:80287e08 r7:ec83de60 r6:858f6e80 r5:85103c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca49fb0 to 0xeca49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:859d49c0 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eca71d84 r8:00000002 r7:60000113 r6:eca71d8c r5:85103000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:858f6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6f00 r8:80287e08 r7:ec83de60 r6:858f6f80 r5:85103000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859d4500 INFO: task kworker/1:334:6023 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 89f11000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fabc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85104800 r7:00000000 r6:83018200 r5:00001000 r4:7f1f9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85937f8c r4:85937c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85937f8c r4:859fe000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85104800 r8:859fe02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe000 r8:80287e08 r7:eca71e60 r6:859fe080 r5:85104800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859d4500 INFO: task kworker/1:335:6024 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:6106 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:6106 tgid:6106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbc1d84 r8:00000002 r7:60000113 r6:ecbc1d8c r5:850fbc00 r4:850fbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc1e08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850fbc00 r8:859fe12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:6109 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:6109 tgid:6109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb31d84 r8:00000002 r7:60000113 r6:ecb31d8c r5:850fd400 r4:850fd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84722b8c r4:859fe200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fd400 r8:859fe22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe200 r8:80287e08 r7:ecbc1e60 r6:859fe280 r5:850fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb31fb0 to 0xecb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852fad40 INFO: task kworker/1:337:6109 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 8a3eb000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:850fe000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84721b8c r4:84721800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84721b8c r4:859fe300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fe000 r8:859fe32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe300 r8:80287e08 r7:ecbc1e60 r6:859fe380 r5:850fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852fae40 INFO: task kworker/1:338:6111 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8a708000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850fc800 r8:859fe42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecbe5fb0 to 0xecbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480300 INFO: task kworker/1:339:6112 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8a7e1000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:340:6113 blocked for more than 475 seconds. r10:8291a684 r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:850fb000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f203000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84721f8c r4:84721c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84721f8c r4:859fe500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fb000 r8:859fe52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe500 r8:80287e08 r7:ecbe1e60 r6:859fe580 r5:850fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852fae00 INFO: task kworker/1:340:6113 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8afc8000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:6117 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbddd84 r8:00000002 r7:60000113 r6:ecbddd8c r5:850fec00 r4:850fec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fec00 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8472178c r4:859fe600 r10:61c88647 r9:850fec00 r8:859fe62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe600 r8:80287e08 r7:ecbe1e60 r6:859fe680 r5:850fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbddfb0 to 0xecbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368100 INFO: task kworker/1:341:6117 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8afc8000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:00001000 r4:dfbf9000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847d0740 Workqueue: events bpf_prog_free_deferred r4:850f8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f20b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84720f8c r4:84720c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84720f8c r4:859fe700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8c00 r8:859fe72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe700 r8:80287e08 r7:ecbdde60 r6:859fe780 r5:850f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368200 INFO: task kworker/1:342:6119 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8b058000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:6121 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:6121 tgid:6121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:850fa400 r4:850fa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f209000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472138c r4:84721000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472138c r4:859fe800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fa400 r8:859fe82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe800 r8:80287e08 r7:ecbf1e60 r6:859fe880 r5:850fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f20d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84720b8c r4:84720800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84720b8c r4:859fe900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f9800 r8:859fe92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe900 r8:80287e08 r7:ecbf1e60 r6:859fe980 r5:850f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368580 INFO: task kworker/1:344:6123 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:345 state:D stack:0 pid:6125 tgid:6125 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599c78c r4:8599c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599c78c r4:859fea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8000 r8:859fea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fea00 r8:80287e08 r7:ecbf9e60 r6:859fea80 r5:850f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368680 INFO: task kworker/1:345:6125 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8baf0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368a00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:859feb00 Exception stack(0xecc01fb0 to 0xecc01ff8) r4:85368800 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8be52000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:6131 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:6131 tgid:6131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbedd84 r8:00000002 r7:60000013 r6:ecbedd8c r5:85970c00 r4:85970c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85970c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec779000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:859fec00 r8:80287e08 r7:ecbfde60 r6:859fec80 r5:85970c00 r4:85368c00 Call trace: 1d20: 8c1a7000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:6132 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:6132 tgid:6132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc09d84 r8:00000002 r7:60000013 r6:ecc09d8c r5:85971800 r4:85971800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85971800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85971800 r7:00000000 r6:83018200 r5:00001000 r4:7f215000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec751000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599cb8c r4:8599c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599cb8c r4:859fed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85971800 r8:859fed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fed00 r8:80287e08 r7:ecbede60 r6:859fed80 r5:85971800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc09fb0 to 0xecc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:6134 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc0dd84 r8:00000002 r7:60000113 r6:ecc0dd8c r5:85970000 r4:85970000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85970000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85312fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85970000 r7:00000000 r6:83018200 r5:00001000 r4:7f219000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599d38c r4:8599d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599d38c r4:859fee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85368a40 Call trace: 1d20: 8c6b3000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368c40 INFO: task kworker/1:350:6136 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8c9c2000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599d78c r4:8599d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599d78c r4:85365000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85973c00 r8:8536502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365000 r8:80287e08 r7:ecc11e60 r6:85365080 r5:85973c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1140 INFO: task kworker/1:351:6137 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8cb8f000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:df9f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8599e38c r4:85365100 r10:00000000 r9:85365100 r8:80287e08 r7:ecc11e60 r6:85365180 r5:85974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a12c0 INFO: task kworker/1:352:6140 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8cf0d000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 INFO: task kworker/1:353:6143 blocked for more than 476 seconds. r4:85975400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a1580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85975400 r7:00000000 r6:83018200 r5:00001000 r4:7f21f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599df8c r4:8599dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599df8c r4:85365200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85975400 r8:8536522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8599e78c r4:8599e400 r4:00000001 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8d467000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8599eb8c r4:85365400 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1700 INFO: task kworker/1:355:6147 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8d715000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:6149 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc29d84 r8:00000002 r7:60000113 r6:ecc29d8c r5:85978c00 r4:85978c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85978c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a1f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f22d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec91d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599f38c r4:8599f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599f38c r4:85365500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85978c00 r8:8536552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8597a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r5:00001000 r4:ec8d1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:6155 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:6155 tgid:6155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc35d84 r8:00000002 r7:60000113 r6:ecc35d8c r5:85979800 r4:85979800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85979800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85979800 r7:00000000 r6:83018200 r5:00001000 r4:7f231000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599fb8c r4:8599f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599fb8c r4:85365700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85979800 r8:8536572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365700 r8:80287e08 r7:ecc29e60 r6:85365780 r5:85979800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc35fb0 to 0xecc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1e00 INFO: task kworker/1:358:6155 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8dba4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:359 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec929000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599f78c r4:8599f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599f78c r4:85365800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8597b000 r8:8536582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365800 r8:80287e08 r7:ecc35e60 r6:85365880 r5:8597b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1e80 INFO: task kworker/1:359:6156 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 r10:8291a684 r9:ecc2dd84 r8:00000002 r7:60000113 r6:ecc2dd8c r5:8597bc00 r5:00001000 r4:ec94d000 r4:85365900 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: 8df5b000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:6160 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:6160 tgid:6160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc3dd84 r8:00000002 r7:60000013 r6:ecc3dd8c r5:8597c800 r4:8597c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:859a838c r4:859a8000 Exception stack(0xecc3dfb0 to 0xecc3dff8) Call trace: 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:859a878c r4:859a8400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8eadf000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:6164 blocked for more than 476 seconds. r4:8597e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e77c0 r10:61c88647 r9:8597e000 r8:85365c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e73c0 INFO: task kworker/1:363:6164 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:364 state:D stack:0 pid:6166 tgid:6166 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7c80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8597ec00 r8:85365d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc45fb0 to 0xecc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7640 INFO: task kworker/1:364:6166 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8eef5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:859a8f8c r4:85365e00 r10:00000000 r9:85365e00 r8:80287e08 r7:ecc45e60 r6:85900e00 r5:84d10000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:6174 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc5dd84 r8:00000002 r7:60000013 r6:ecc5dd8c r5:84d15400 r4:84d15400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84d15400 r8:85365eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85365e80 r8:80287e08 r7:ecc45e60 r6:85900e80 r5:84d15400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847d0740 r10:8291a684 r9:ecc61d84 r8:00000002 r7:60000113 r6:ecc61d8c r5:84d14800 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8f468000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:6176 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:6176 tgid:6176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc65d84 r8:00000002 r7:60000113 r6:ecc65d8c r5:857f3c00 r4:857f3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df885000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a9b8c r4:859a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859a9b8c r4:85365f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f3c00 r8:85365fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365f80 r8:80287e08 r7:ecc61e60 r6:85900f80 r5:857f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc65fb0 to 0xecc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7c40 INFO: task kworker/1:368:6176 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8f870000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecad1d84 r8:00000002 r7:60000013 r6:ecad1d8c r5:84d16c00 r4:84d16c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d16c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a580c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859abb8c r4:859ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859abb8c r4:851fd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d16c00 r8:851fd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd000 r8:80287e08 r7:ecc61e60 r6:85370000 r5:84d16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7f80 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:857f5400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:859aa38c r4:851fd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f5400 r8:851fd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd080 r8:80287e08 r7:ecad1e60 r6:85370080 r5:857f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc55fb0 to 0xecc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7f80 INFO: task kworker/1:370:6184 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8fe94000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1540 r5:00001000 r4:ebc45000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ab38c r4:859ab000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85981800 r8:851fd12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd100 r8:80287e08 r7:ecad1e60 r6:851fd180 r5:85981800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd6dfb0 to 0xecd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fe40 INFO: task kworker/1:371:6220 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8fe94000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eccb9d84 r8:00000002 r7:60000113 r6:eccb9d8c r5:85984800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84480e00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 901c5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:373 state:D stack:0 pid:6286 tgid:6286 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84314800 r7:00000000 r6:83018200 r5:00001000 r4:7f2bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec73b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84723b8c r4:84723800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84723b8c r4:851fd300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84314800 r8:851fd32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd300 r8:80287e08 r7:ecad1e60 r6:85370100 r5:84314800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58100 INFO: task kworker/1:373:6286 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 901c5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84315400 r8:851fd3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd380 r8:80287e08 r7:ecd7de60 r6:85370180 r5:84315400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58100 INFO: task kworker/1:374:6287 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 905da000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 r5:00001000 r4:dfbf9000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58740 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851fd400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58280 INFO: task kworker/1:375:6290 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 905da000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:6292 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:6292 tgid:6292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecde9d84 r8:00000002 r7:60000013 r6:ecde9d8c r5:84313c00 r4:84313c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84313c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84313c00 r8:851fd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:6294 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:6294 tgid:6294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdedd84 r8:00000002 r7:60000113 r6:ecdedd8c r5:84313000 r4:84313000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84313000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84313000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec813000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b038c r4:859b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b038c r4:851fd500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84313000 r8:851fd52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd500 r8:80287e08 r7:ecde5e60 r6:85370300 r5:84313000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdedfb0 to 0xecdedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a585c0 INFO: task kworker/1:377:6294 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 91238000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:6296 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:6296 tgid:6296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ecdf1d84 r8:00000002 r7:60000113 r6:ecdf1d8c r5:84310000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84310000 r8:851fd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecdf1fb0 to 0xecdf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58780 INFO: task kworker/1:378:6296 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9151a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:6297 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:6297 tgid:6297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdf5d84 r8:00000002 r7:60000013 r6:ecdf5d8c r5:84310c00 r4:84310c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84310c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84310c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec843000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b078c r4:859b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b078c r4:851fd600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84310c00 r8:851fd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd600 r8:80287e08 r7:ecdf1e60 r6:85370400 r5:84310c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf5fb0 to 0xecdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:379:6297 is blocked on a mutex likely owned by task kworker/1:6:3130. Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:380 state:D stack:0 pid:6300 tgid:6300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece01d84 r8:00000002 r7:60000113 r6:ece01d8c r5:84312400 r4:84312400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84312400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84312400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b0f8c r4:859b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b0f8c r4:851fd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84312400 r8:851fd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd680 r8:80287e08 r7:ecdf1e60 r6:85370480 r5:84312400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58900 INFO: task kworker/1:380:6300 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 918cf000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:6302 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:6302 tgid:6302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece09d84 r8:00000002 r7:60000113 r6:ece09d8c r5:85978000 r4:85978000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85978000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85978000 r7:00000000 r6:83018200 r5:00001000 r4:7f2cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec915000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b138c r4:859b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b138c r4:851fd700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85978000 r8:851fd72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd700 r8:80287e08 r7:ece01e60 r6:85370500 r5:85978000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece09fb0 to 0xece09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58980 INFO: task kworker/1:381:6302 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 91b7a000 eca77000 00000001 80239b98 7f1eb000 00000001 r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:6304 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:6304 tgid:6304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece0dd84 r8:00000002 r7:60000113 r6:ece0dd8c r5:84311800 r4:84311800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84311800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84311800 r7:00000000 r6:83018200 r5:00001000 r4:7f2cd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec937000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b178c r4:859b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b178c r4:851fd780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84311800 r8:851fd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd780 r8:80287e08 r7:ece09e60 r6:85370580 r5:84311800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece0dfb0 to 0xece0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:6306 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece11d84 r8:00000002 r7:60000013 r6:ece11d8c r5:84316000 r4:84316000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84316000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84316000 r7:00000000 r6:83018200 r5:00001000 r4:7f2cf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:859b1b8c r4:851fd800 r4:00000001 r4:85a58d00 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018205 r8:85948000 r7:00000000 r6:83018200 r5:00001000 r4:7f2d1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b1f8c r4:859b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b1f8c r4:851fd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85948000 r8:851fd8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd880 r8:80287e08 r7:ece11e60 r6:85370680 r5:85948000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece15fb0 to 0xece15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58c80 INFO: task kworker/1:384:6308 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 92151000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 INFO: task kworker/1:385:6310 blocked for more than 477 seconds. r4:85986000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece05e08 r4:00000000 r5:859b278c r4:859b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b278c r4:851fd900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85986000 r8:851fd92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd900 r8:80287e08 r7:ece15e60 r6:851fd980 r5:85986000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece05fb0 to 0xece05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a54a00 INFO: task kworker/1:385:6310 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9278b000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecda1d84 r8:00000002 r7:60000113 r6:ecda1d8c r5:85982400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:859b238c r4:851fda00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 92b09000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:387:6314 blocked for more than 477 seconds. r5:85980c00 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:859b2b8c r4:859b2800 r10:61c88647 r9:85980c00 r8:851fdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:6316 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:6316 tgid:6316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece1dd84 r8:00000002 r7:60000013 r6:ece1dd8c r5:85983000 r4:85983000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecabd000 r5:859b2f8c r4:859b2c00 r10:61c88647 r9:85983000 r8:851fdc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fdc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdc00 r8:80287e08 r7:ece19e60 r6:851fdc80 r5:85983000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece1dfb0 to 0xece1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a530c0 INFO: task kworker/1:388:6316 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 92ff9000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Not tainted 6.15.0-rc7-syzkaller #0 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85985400 r7:00000000 r6:83018200 r5:00001000 r4:7f2e3000 r5:859b3b8c r4:859b3800 r10:61c88647 r9:85985400 r8:851fdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 93466000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:6321 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:6321 tgid:6321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece2dd84 r8:00000002 r7:60000113 r6:ece2dd8c r5:85983c00 r4:85983c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85983c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a53b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85983c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2df000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a53c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b378c r4:859b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b378c r4:851fdf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85976c00 r8:851fdf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fdf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdf00 r8:80287e08 r7:ece25e60 r6:851fdf80 r5:85976c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece31fb0 to 0xece31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a53a80 INFO: task kworker/1:391:6324 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 93903000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85948c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccade08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85948c00 r8:85a5a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a000 r8:80287e08 r7:ece25e60 r6:85370700 r5:85948c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccadfb0 to 0xeccadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a53d80 INFO: task kworker/1:392:6325 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 93ba6000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:393 state:D stack:0 pid:6328 tgid:6328 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:6330 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:6330 tgid:6330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece21d84 r8:00000002 r7:60000013 r6:ece21d8c r5:8594a400 r4:8594a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece21e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:859b8b8c r4:859b8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594b000 r7:00000000 r6:83018200 r5:00001000 r4:7f2ef000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b8f8c r4:859b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b8f8c r4:85a5a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594b000 r8:85a5a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a180 r8:80287e08 r7:ece21e60 r6:85370880 r5:8594b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece35fb0 to 0xece35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4b1c0 INFO: task kworker/1:395:6334 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 94847000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:859b938c r4:859b9000 r10:61c88647 r9:8594bc00 r8:85a5a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:6339 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:6339 tgid:6339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece41d84 r8:00000002 r7:60000113 r6:ece41d8c r5:8594c800 r4:8594c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594c800 r7:00000000 r6:83018200 r5:00001000 r4:7f1f5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b978c r4:859b9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b978c r4:85a5a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594c800 r8:85a5a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a280 r8:80287e08 r7:ece3de60 r6:85370980 r5:8594c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece41fb0 to 0xece41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:6340 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:6340 tgid:6340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece45d84 r8:00000002 r7:60000113 r6:ece45d8c r5:8594d400 r4:8594d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859ba38c r4:859ba000 r7:ddde2d80 r6:83018200 r5:859ba38c r4:85a5a300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r9:83018205 r8:8594e000 r7:00000000 r6:83018200 r5:00001000 r4:7f2f3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a5a380 r8:80287e08 r7:ece45e60 r6:85370a80 r5:8594e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4b8c0 INFO: task kworker/1:399:6341 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 951d2000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:6344 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8594ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece4de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:400:6344 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 95631000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:401:6345 blocked for more than 477 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ece5b000 r5:859bab8c r4:859ba800 r10:61c88647 r9:85438000 r8:85a5a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece39d84 r8:00000002 r7:60000113 r6:ece39d8c r5:85438c00 r4:85438c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4bdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2fb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ba78c r4:859ba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859ba78c r4:85a5a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438c00 r8:85a5a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a500 r8:80287e08 r7:ece51e60 r6:85370c00 r5:85438c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece39fb0 to 0xece39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4ba00 INFO: task kworker/1:402:6347 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a53f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85439800 r7:00000000 r6:83018200 r5:00001000 r4:7f301000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859baf8c r4:859bac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859baf8c r4:85a5a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85439800 r8:85a5a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a580 r8:80287e08 r7:ece51e60 r6:85370c80 r5:85439800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece59fb0 to 0xece59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4be00 INFO: task kworker/1:403:6352 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:8543b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r9:83018205 r8:8543b000 r7:00000000 r6:83018200 r5:00001000 r4:7f303000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:6356 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:6356 tgid:6356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece81d84 r8:00000002 r7:60000113 r6:ece81d8c r5:8543c800 r4:8543c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece81e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f309000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bbf8c r4:859bbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bbf8c r4:85a5a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543c800 r8:85a5a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a680 r8:80287e08 r7:ece79e60 r6:85370d80 r5:8543c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:405:6356 is blocked on a mutex likely owned by task kworker/1:6:3130. 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 r5:00001000 r4:ece83000 r7:ddde2d80 r6:83018200 r5:859bb78c r4:85a5a700 r4:85a5a700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a700 r8:80287e08 r7:ece81e60 r6:85370e00 r5:8543d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece91fb0 to 0xece91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce600 INFO: task kworker/1:406:6358 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 96f9c000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) task:kworker/1:407 state:D stack:0 pid:6359 tgid:6359 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece9de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f080 INFO: task kworker/1:407:6359 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 96f9c000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:408:6361 is blocked on a mutex likely owned by task kworker/1:6:3130. Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 978c0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:6363 tgid:6363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceb5d84 r8:00000002 r7:60000113 r6:eceb5d8c r5:8543e000 r4:8543e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543e000 r7:00000000 r6:83018200 r5:00001000 r4:7f30b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bc38c r4:859bc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bc38c r4:85a5a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543e000 r8:85a5a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85a5a880 r8:80287e08 r7:ecea9e60 r6:85370f80 r5:8543e000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fa40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bcb8c r4:859bc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bcb8c r4:85a5a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e08000 r8:85a5a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a900 r8:80287e08 r7:ecea9e60 r6:85a4a000 r5:84e08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f480 INFO: task kworker/1:410:6367 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 97ecb000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:6369 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecee9d84 r8:00000002 r7:60000113 r6:ecee9d8c r5:84e09800 r4:84e09800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e09800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84e09800 r7:00000000 r6:83018200 r5:00001000 r4:7f31d000 r10:61c88647 r9:84e09800 r8:85a5a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 981c6000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecedf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bcf8c r4:859bcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bcf8c r4:85a5aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e0a400 r8:85a5aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:847d0740 r4:84e08c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:84e08c00 r8:85a5aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:6374 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:6374 tgid:6374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceb1d84 r8:00000002 r7:60000113 r6:eceb1d8c r5:84e0bc00 r4:84e0bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e0bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecf07000 r10:61c88647 r9:84e0bc00 r8:85a5ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf19e08 r10:61c88647 r9:84e0c800 r8:85a5abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538ff00 INFO: task kworker/1:415:6378 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 98c71000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf25e08 r5:859be78c r4:859be400 r10:61c88647 r9:84e0d400 r8:85a5ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f680 INFO: task kworker/1:416:6380 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 98f5d000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:6381 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:6381 tgid:6381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf31d84 r8:00000002 r7:60000013 r6:ecf31d8c r5:84e0e000 r4:84e0e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:859bdf8c r4:859bdc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r4:847e6b00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f325000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859beb8c r4:859be800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859beb8c r4:85a5ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e0b000 r8:85a5acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5ac80 r8:80287e08 r7:ecf25e60 r6:85a4a400 r5:84e0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf45fb0 to 0xecf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1100 INFO: task kworker/1:418:6385 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 99306000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847e6b00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e15c0 r9:83018205 r8:85958000 r7:00000000 r6:83018200 r5:00001000 r4:7f327000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bef8c r4:859bec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bef8c r4:85a5ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85958000 r8:85a5adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847d0740 r4:85959800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:853e1240 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:8595a400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1a00 r10:61c88647 r9:8595a400 r8:85a5aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:df9f1dc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:422 state:D stack:0 pid:6403 tgid:6403 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec8a7000 r4:85a5af00 INFO: task kworker/1:422:6403 is blocked on a mutex likely owned by task kworker/1:6:3130. r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r4:847d0740 Not tainted 6.15.0-rc7-syzkaller #0 r4:8595d400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed009e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595d400 r7:00000000 r6:83018200 r5:00001000 r4:7f2ff000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bff8c r4:859bfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bff8c r4:85a5af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595d400 r8:85a5afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5af80 r8:80287e08 r7:ecf65e60 r6:85a4a680 r5:8595d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed009fb0 to 0xed009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5180 INFO: task kworker/1:423:6445 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r5:800f0113 r4:80239bb0 r4:df9f1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf61e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595e000 r7:00000000 r6:83018200 r5:00001000 r4:7f30b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec983000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c078c r4:859c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c078c r4:85aa6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595e000 r8:85aa602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6000 r8:80287e08 r7:ed009e60 r6:85a4a700 r5:8595e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf61fb0 to 0xecf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa52c0 INFO: task kworker/1:424:6446 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:6448 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:8595ec00 r4:8595ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8595ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f305000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec967000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472838c r4:84728000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472838c r4:85aa6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:426:6453 blocked for more than 478 seconds. r5:8595c800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85aa6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6100 r8:80287e08 r7:ecf61e60 r6:85a4a800 r5:8595c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a5fb0 to 0xec8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5640 INFO: task kworker/1:426:6453 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9a527000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec965e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595b000 r7:00000000 r6:83018200 r5:00001000 r4:7f30f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c0b8c r4:859c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c0b8c r4:85aa6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595b000 r8:85aa61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6180 r8:80287e08 r7:ecf61e60 r6:85a4a880 r5:8595b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec965fb0 to 0xec965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5800 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:6458 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:6458 tgid:6458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec909d84 r8:00000002 r7:60000013 r6:ec909d8c r5:85958c00 r4:85958c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85958c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85958c00 r7:00000000 r6:83018200 r5:00001000 r4:7f311000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec993000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec99dd84 r8:00000002 r7:60000013 r6:ec99dd8c r5:8543ec00 r4:8543ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c138c r4:859c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c138c r4:85aa6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543ec00 r8:85aa62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6280 r8:80287e08 r7:ec909e60 r6:85a4a980 r5:8543ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec99dfb0 to 0xec99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5bc0 INFO: task kworker/1:429:6460 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:6462 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c178c r4:859c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c178c r4:85aa6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e0ec00 r8:85aa632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6300 r8:80287e08 r7:ec99de60 r6:85a4aa00 r5:84e0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5d00 INFO: task kworker/1:430:6462 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9aeb0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:431 state:D stack:0 pid:6465 tgid:6465 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c1b8c r4:859c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c1b8c r4:85aa6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84440000 r8:85aa63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6380 r8:80287e08 r7:ec9ade60 r6:85a4aa80 r5:84440000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec981fb0 to 0xec981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5ec0 INFO: task kworker/1:431:6465 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9aeb0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:84440c00 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84440c00 r8:85aa642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:6469 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:6469 tgid:6469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:84442400 r4:84442400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84442400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84442400 r7:00000000 r6:83018200 r5:00001000 r4:7f31f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c238c r4:859c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c238c r4:85aa6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84442400 r8:85aa64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6480 r8:80287e08 r7:ec9cde60 r6:85a4ab80 r5:84442400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab11c0 INFO: task kworker/1:433:6469 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9b734000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:84443c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84443c00 r8:85aa652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: 9b734000 eca77000 00000001 80239b98 7f1eb000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 task:kworker/1:435 state:D stack:0 pid:6473 tgid:6473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9fdd84 r8:00000002 r7:60000113 r6:ec9fdd8c r5:84444800 r4:84444800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84444800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84444800 r7:00000000 r6:83018200 r5:00001000 r4:7f34d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c378c r4:859c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c378c r4:85aa6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84444800 r8:85aa65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6580 r8:80287e08 r7:ec9ede60 r6:85a4ac80 r5:84444800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9fdfb0 to 0xec9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1380 INFO: task kworker/1:435:6473 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eca09d84 r8:00000002 r7:60000013 r6:eca09d8c r5:84445400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:85ab1380 INFO: task kworker/1:436:6474 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9bdf0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eca0f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1500 INFO: task kworker/1:437:6476 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9bf03000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8598b000 r8:85aa67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:6481 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca25d84 r8:00000002 r7:60000113 r6:eca25d8c r5:8598bc00 r4:8598bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8598bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f34f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c3b8c r4:859c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c3b8c r4:85aa6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598bc00 r8:85aa68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6880 r8:80287e08 r7:ec9fde60 r6:85aa6900 r5:8598bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca25fb0 to 0xeca25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1b80 INFO: task kworker/1:439:6481 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9c4b3000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:6483 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:6483 tgid:6483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca31d84 r8:00000002 r7:60000113 r6:eca31d8c r5:8598c800 r4:8598c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1d80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8598c800 r8:85aa69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1cc0 INFO: task kworker/1:440:6483 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9c870000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:6485 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecab5d84 r8:00000002 r7:60000013 r6:ecab5d8c r5:8598d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab5e08 r5:00001000 r4:eca87000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8598d400 r8:85aa6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6a80 r8:80287e08 r7:eca31e60 r6:85aa6b00 r5:8598d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab5fb0 to 0xecab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1b80 INFO: task kworker/1:441:6485 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9c870000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:847d0740 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84441800 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3040 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84441800 r8:85aa6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85aa6b80 r8:80287e08 r7:ecab5e60 r6:85a4ad80 r5:84441800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85ab1b80 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:6489 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:6489 tgid:6489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecae9d84 r8:00000002 r7:60000113 r6:ecae9d8c r5:84446c00 r4:84446c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84446c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f355000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c478c r4:859c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c478c r4:85aa6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84446c00 r8:85aa6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6c00 r8:80287e08 r7:ecad9e60 r6:85a4ae00 r5:84446c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae9fb0 to 0xecae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5d80 INFO: task kworker/1:443:6489 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9cb82000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:6491 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:6491 tgid:6491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf9d84 r8:00000002 r7:60000113 r6:ecaf9d8c r5:84443000 r4:84443000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84443000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84443000 r7:00000000 r6:83018200 r5:00001000 r4:7f359000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c4f8c r4:859c4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c4f8c r4:85aa6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84443000 r8:85aa6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6c80 r8:80287e08 r7:ecad9e60 r6:85a4ae80 r5:84443000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d30c0 INFO: task kworker/1:444:6491 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9d09a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:847d0740 task:kworker/1:445 state:D stack:0 pid:6493 tgid:6493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8598e000 r7:00000000 r6:83018200 r5:00001000 r4:7f35b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c538c r4:859c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c538c r4:85aa6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598e000 r8:85aa6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6d00 r8:80287e08 r7:ecaf9e60 r6:85aa6d80 r5:8598e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d30c0 INFO: task kworker/1:445:6493 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9d09a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:6496 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:6496 tgid:6496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf5d84 r8:00000002 r7:60000013 r6:ecaf5d8c r5:8598ec00 r4:8598ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8598ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f363000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c638c r4:859c6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8598ec00 r8:85aa6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d32c0 r4:00000000 r5:800f0113 r4:80239bb0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 task:kworker/1:447 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ecb25d84 r8:00000002 r7:60000113 r6:ecb25d8c r5:85988000 r4:85988000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85988000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85988000 r7:00000000 r6:83018200 r5:00001000 r4:7f35d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c578c r4:859c5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c578c r4:85aa6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85988000 r8:85aa6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6f00 r8:80287e08 r7:ecaf5e60 r6:85aa6f80 r5:85988000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb25fb0 to 0xecb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d3400 INFO: task kworker/1:447:6497 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9d561000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:6499 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb65d84 r8:00000002 r7:60000113 r6:ecb65d8c r5:85989800 r4:85989800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85989800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85989800 r7:00000000 r6:83018200 r5:00001000 r4:7f35f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c5b8c r4:859c5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c5b8c r4:854fa000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)