INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000013 r6:df845d8c r5:83238000 r4:83238000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858abb8c r4:858ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858abb8c r4:830b8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:80287e08 r7:df83de60 r6:830b8680 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5940 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dfe6d000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/0:2:47 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df921d84 r8:00000002 r7:60000013 r6:df921d8c r5:83395400 r4:83395400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83395400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83395400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b038c r4:858b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b038c r4:83364b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83395400 r8:83364bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83364b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83364b80 r8:80287e08 r7:df83de60 r6:83364c00 r5:83395400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:833684c0 INFO: task kworker/0:2:47 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e17b2000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/1:1:51 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:51 tgid:51 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df931d84 r8:00000002 r7:60000113 r6:df931d8c r5:832e0000 r4:832e0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832e0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df931e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c51f8c r4:85c51c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c51f8c r4:832a0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832e0000 r8:832a002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0000 r8:80287e08 r7:df879e60 r6:832a0080 r5:832e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf931fb0 to 0xdf931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832a1080 INFO: task kworker/1:1:51 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e2732000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/0:0:3097 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3097 tgid:3097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df98dd84 r8:00000002 r7:60000013 r6:df98dd8c r5:83af8000 r4:83af8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83af8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ab38c r4:858ab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ab38c r4:84836d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83af8000 r8:84836d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84836d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84836d00 r8:80287e08 r7:df921e60 r6:84864d00 r5:83af8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84549a00 INFO: task kworker/0:0:3097 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e2e06000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/0:3:3114 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df969d84 r8:00000002 r7:60000113 r6:df969d8c r5:844c8c00 r4:844c8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df969e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec635000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858abf8c r4:858abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858abf8c r4:84836f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c8c00 r8:84836f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84836f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84836f00 r8:80287e08 r7:df921e60 r6:84836f80 r5:844c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf969fb0 to 0xdf969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438d440 INFO: task kworker/0:3:3114 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e2e06000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/1:5:3121 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:844c8000 r4:844c8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b4700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7238c r4:84a72000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7238c r4:84864100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c8000 r8:8486412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864100 r8:80287e08 r7:ec519e60 r6:84836e00 r5:844c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867040 INFO: task kworker/1:5:3121 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e3061000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/1:6:3123 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:844d2400 r4:844d2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509f040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7078c r4:84a70400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7078c r4:84864080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d2400 r8:848640ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864080 r8:80287e08 r7:df9e9e60 r6:84836d80 r5:844d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848672c0 INFO: task kworker/1:6:3123 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e3599000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/1:7:3126 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa0dd84 r8:00000002 r7:60000113 r6:dfa0dd8c r5:841f0000 r4:841f0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841f0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 INFO: task kworker/1:7:3126 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e3599000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/1:8:3127 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:841f0c00 r4:841f0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841f0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848673c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a70b8c r4:84a70800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a70b8c r4:84864000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0c00 r8:8486402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864000 r8:80287e08 r7:df9e9e60 r6:84836a80 r5:841f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848671c0 INFO: task kworker/1:8:3127 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e39eb000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 INFO: task kworker/1:9:3129 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:841f1800 r4:841f1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841f1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850969c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdd38c r4:84bdd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdd38c r4:84864d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f1800 r8:84864dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864d80 r8:80287e08 r7:df9e9e60 r6:84836980 r5:841f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867400 INFO: task kworker/1:9:3129 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e3c95000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3131 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:841f5400 r4:841f5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841f5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bde38c r4:84bde000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bde38c r4:84864280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f5400 r8:848642ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864280 r8:80287e08 r7:df9e9e60 r6:84836480 r5:841f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848677c0 INFO: task kworker/1:10:3131 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e3c95000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3133 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa4dd84 r8:00000002 r7:60000013 r6:dfa4dd8c r5:841f6000 r4:841f6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841f6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdef8c r4:84bdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdef8c r4:84864300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f6000 r8:8486432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864300 r8:80287e08 r7:df9e9e60 r6:847ccd00 r5:841f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867740 INFO: task kworker/1:11:3133 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e40e7000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3135 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83236000 r4:83236000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851feb8c r4:851fe800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851feb8c r4:84864580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:848645ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864580 r8:80287e08 r7:df9e9e60 r6:840bfd00 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867880 INFO: task kworker/1:12:3135 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e40e7000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3137 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:841f6c00 r4:841f6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841f6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dda40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ff78c r4:851ff400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ff78c r4:84864500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f6c00 r8:8486452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864500 r8:80287e08 r7:df9e9e60 r6:83c57700 r5:841f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867a40 INFO: task kworker/1:13:3137 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e444a000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3139 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:841cec00 r4:841cec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841cec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d4ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531578c r4:85315400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531578c r4:84864600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841cec00 r8:8486462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864600 r8:80287e08 r7:df9e9e60 r6:83c57680 r5:841cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867a00 INFO: task kworker/1:14:3139 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e444a000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3142 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:841cd400 r4:841cd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841cd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b4200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7278c r4:84a72400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7278c r4:84864780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841cd400 r8:848647ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864780 r8:80287e08 r7:dfa75e60 r6:83c61300 r5:841cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867bc0 INFO: task kworker/1:15:3142 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e444a000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:841cb000 r4:841cb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841cb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854757c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85315b8c r4:85315800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85315b8c r4:84864700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841cb000 r8:8486472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864700 r8:80287e08 r7:dfa75e60 r6:83c61280 r5:841cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867cc0 INFO: task kworker/1:16:3144 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e485b000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3146 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9a9d84 r8:00000002 r7:60000113 r6:df9a9d8c r5:83b08000 r4:83b08000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b08000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d76c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b08000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aaf8c r4:854aac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854aaf8c r4:84864680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b08000 r8:848646ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864680 r8:80287e08 r7:dfaa1e60 r6:84864800 r5:83b08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867e80 INFO: task kworker/1:17:3146 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e485b000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3148 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9a1d84 r8:00000002 r7:60000113 r6:df9a1d8c r5:83b09800 r4:83b09800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b09800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b09800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bf78c r4:854bf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bf78c r4:84864880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b09800 r8:848648ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864880 r8:80287e08 r7:df9a9e60 r6:84864900 r5:83b09800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a1fb0 to 0xdf9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867e80 INFO: task kworker/1:18:3148 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e4acf000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3149 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac5d84 r8:00000002 r7:60000013 r6:dfac5d8c r5:841cc800 r4:841cc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841cc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854664c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bcf8c r4:854bcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bcf8c r4:84864980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841cc800 r8:848649ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864980 r8:80287e08 r7:df9a1e60 r6:83aa6780 r5:841cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a080 INFO: task kworker/1:19:3149 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e4e6c000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3152 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:844d1800 r4:844d1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854be78c r4:854be400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854be78c r4:84864a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d1800 r8:84864a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864a00 r8:80287e08 r7:df9a1e60 r6:84611d00 r5:844d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a0c0 INFO: task kworker/1:20:3152 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e4e6c000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3154 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:832f0000 r4:832f0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832f0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856266c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d378c r4:855d3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d378c r4:84864b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f0000 r8:84864b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864b00 r8:80287e08 r7:df9a1e60 r6:84611e00 r5:832f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a300 INFO: task kworker/1:21:3154 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e54e7000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:832f3c00 r4:832f3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832f3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456a540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7378c r4:84a73400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7378c r4:84864b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f3c00 r8:84864bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864b80 r8:80287e08 r7:dfae1e60 r6:84590000 r5:832f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a4c0 INFO: task kworker/1:22:3156 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e58fb000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3158 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83b06000 r4:83b06000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b06000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84808580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b06000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb351000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a138c r4:856a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a138c r4:84864a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b06000 r8:84864aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864a80 r8:80287e08 r7:dfaede60 r6:84590080 r5:83b06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a580 INFO: task kworker/1:23:3158 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e58fb000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3160 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:83b02400 r4:83b02400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b02400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b02400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fb38c r4:855fb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fb38c r4:84864e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b02400 r8:84864eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864e80 r8:80287e08 r7:dfafde60 r6:84590100 r5:83b02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a580 INFO: task kworker/1:24:3160 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e5dd0000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3161 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:83b01800 r4:83b01800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b01800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841db540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a078c r4:856a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a078c r4:84864f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b01800 r8:84864f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864f00 r8:80287e08 r7:dfafde60 r6:84590180 r5:83b01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a6c0 INFO: task kworker/1:25:3161 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e5dd0000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3164 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:83b04800 r4:83b04800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b04800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848017c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb155000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a338c r4:856a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a338c r4:84864e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b04800 r8:84864e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864e00 r8:80287e08 r7:dfafde60 r6:84590200 r5:83b04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a940 INFO: task kworker/1:26:3164 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e60f9000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3165 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83b03c00 r4:83b03c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b03c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456f680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a238c r4:856a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a238c r4:84864f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b03c00 r8:84864fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864f80 r8:80287e08 r7:dfb29e60 r6:84590280 r5:83b03c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456a940 INFO: task kworker/1:27:3165 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e6183000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3167 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:83b00c00 r4:83b00c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482a580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a538c r4:857a5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a538c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00c00 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfb29e60 r6:84590300 r5:83b00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456ac80 INFO: task kworker/1:28:3167 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e6183000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3170 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000013 r6:dfb4dd8c r5:832f2400 r4:832f2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832f2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506e740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7a38c r4:84a7a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7a38c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f2400 r8:830b842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:dfb41e60 r6:84590380 r5:832f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456adc0 INFO: task kworker/1:29:3170 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e6a42000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3172 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:833aa400 r4:833aa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833aa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858516c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb723000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7a78c r4:84a7a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7a78c r4:838c4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833aa400 r8:838c442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838c4400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838c4400 r8:80287e08 r7:dfb4de60 r6:84590400 r5:833aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456adc0 INFO: task kworker/1:30:3172 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e6a42000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3174 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:84103000 r4:84103000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84103000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84103000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb381000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7ab8c r4:84a7a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7ab8c r4:8429c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84103000 r8:8429c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8429c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429c500 r8:80287e08 r7:dfb59e60 r6:84590480 r5:84103000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a5f740 INFO: task kworker/1:31:3174 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e6a42000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3184 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84104800 r4:84104800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84104800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d0040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84104800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85828f8c r4:85828c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85828f8c r4:8429c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84104800 r8:8429c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8429c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429c480 r8:80287e08 r7:dfb65e60 r6:84590500 r5:84104800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:32:3184 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e6e4e000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:84100000 r4:84100000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84100000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d0a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84100000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb109000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582a38c r4:8582a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582a38c r4:830cc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84100000 r8:830cc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc100 r8:80287e08 r7:dfbbde60 r6:84590580 r5:84100000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:33:3185 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e6e4e000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3186 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84106000 r4:84106000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84106000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84106000 r7:00000000 r6:83018200 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7c78c r4:84a7c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7c78c r4:830cc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84106000 r8:830cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc080 r8:80287e08 r7:dfbc1e60 r6:84590600 r5:84106000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:34:3186 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e740e000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:83b11800 r4:83b11800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b11800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84597500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b11800 r7:00000000 r6:83018200 r5:00001000 r4:7f139000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7cb8c r4:84a7c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7cb8c r4:832a0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b11800 r8:832a06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0680 r8:80287e08 r7:dfbc5e60 r6:84590680 r5:83b11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:35:3187 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e740e000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3188 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd5d84 r8:00000002 r7:60000013 r6:dfbd5d8c r5:83b16c00 r4:83b16c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b16c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f137000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bf8c r4:8582bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582bf8c r4:832a0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b16c00 r8:832a062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0600 r8:80287e08 r7:dfbd1e60 r6:84590700 r5:83b16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:36:3188 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e79c1000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:83b13c00 r4:83b13c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b13c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f135000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bb8c r4:8582b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582bb8c r4:84a8e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b13c00 r8:84a8e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e000 r8:80287e08 r7:dfbd5e60 r6:84590780 r5:83b13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:37:3189 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e7b62000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3191 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83b13000 r4:83b13000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b13000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b13000 r7:00000000 r6:83018200 r5:00001000 r4:7f10d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b38c r4:8582b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582b38c r4:84a8e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b13000 r8:84a8e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e080 r8:80287e08 r7:dfbb9e60 r6:84590800 r5:83b13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:38:3191 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e7b62000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbddd84 r8:00000002 r7:60000013 r6:dfbddd8c r5:83b15400 r4:83b15400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b15400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b15400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b78c r4:8582b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582b78c r4:84a8e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b15400 r8:84a8e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e100 r8:80287e08 r7:dfbd9e60 r6:84590880 r5:83b15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:39:3192 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e808d000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3193 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:83b10000 r4:83b10000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b10000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b10000 r7:00000000 r6:83018200 r5:00001000 r4:7f219000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7d38c r4:84a7d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7d38c r4:84a8e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b10000 r8:84a8e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e180 r8:80287e08 r7:dfbdde60 r6:84590900 r5:83b10000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:40:3193 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e808d000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3194 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83b12400 r4:83b12400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b12400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84597bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b12400 r7:00000000 r6:83018200 r5:00001000 r4:7f1bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb907000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c378c r4:859c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c378c r4:84a8e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b12400 r8:84a8e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e200 r8:80287e08 r7:dfbe1e60 r6:84590980 r5:83b12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597800 INFO: task kworker/1:41:3194 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e8282000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3198 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:83ff5400 r4:83ff5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ff5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ff5400 r7:00000000 r6:83018200 r5:00001000 r4:7f749000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed881000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8487d38c r4:8487d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487d38c r4:84a8e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ff5400 r8:84a8e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e280 r8:80287e08 r7:dfbe1e60 r6:84590a00 r5:83ff5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597d40 INFO: task kworker/1:42:3198 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e860d000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:83ff6c00 r4:83ff6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ff6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85493b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ff6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f26d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c478c r4:859c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c478c r4:84a8e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ff6c00 r8:84a8e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e300 r8:80287e08 r7:dfc11e60 r6:84590a80 r5:83ff6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597d40 INFO: task kworker/1:43:3199 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e88c7000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3201 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:83ff0c00 r4:83ff0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ff0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f0300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ff0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f219000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c538c r4:859c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c538c r4:84a8e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ff0c00 r8:84a8e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e380 r8:80287e08 r7:dfc11e60 r6:84590b00 r5:83ff0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84597dc0 INFO: task kworker/1:44:3201 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e8cb9000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3203 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:83ff6000 r4:83ff6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ff6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a592c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ff6000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c5f8c r4:859c5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c5f8c r4:84a8e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ff6000 r8:84a8e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e400 r8:80287e08 r7:dfc11e60 r6:84590b80 r5:83ff6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a0bc0 INFO: task kworker/1:45:3203 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e8cb9000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3205 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000013 r6:dfc3dd8c r5:83ff1800 r4:83ff1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ff1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a59d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ff1800 r7:00000000 r6:83018200 r5:00001000 r4:7f2d9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec735000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c638c r4:859c6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c638c r4:84a8e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ff1800 r8:84a8e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e480 r8:80287e08 r7:dfc11e60 r6:84590c00 r5:83ff1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84595100 INFO: task kworker/1:46:3205 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e8f53000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3207 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc4dd84 r8:00000002 r7:60000013 r6:dfc4dd8c r5:849c8c00 r4:849c8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848e6440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c51b8c r4:85c51800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c51b8c r4:84a8e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c8c00 r8:84a8e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e500 r8:80287e08 r7:dfc11e60 r6:84590c80 r5:849c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e6000 INFO: task kworker/1:47:3207 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e8f53000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3210 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:849ca400 r4:849ca400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ca400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b078c r4:858b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b078c r4:84590d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ca400 r8:84590d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84590d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84590d00 r8:80287e08 r7:df921e60 r6:84590d80 r5:849ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e4700 INFO: task kworker/0:4:3210 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e990f000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3211 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:849c9800 r4:849c9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eba40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec73d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0b8c r4:858b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b0b8c r4:84590e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c9800 r8:84590e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84590e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84590e00 r8:80287e08 r7:dfc61e60 r6:84590e80 r5:849c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e4540 INFO: task kworker/0:5:3211 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e990f000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3214 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:849cbc00 r4:849cbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849cbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ebb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0f8c r4:858b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b0f8c r4:84590f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849cbc00 r8:84590f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84590f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84590f00 r8:80287e08 r7:dfc65e60 r6:84590f80 r5:849cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e4b80 INFO: task kworker/0:6:3214 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e9a17000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3216 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:849cc800 r4:849cc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849cc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ebc80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b138c r4:858b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b138c r4:84a90000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849cc800 r8:84a9002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90000 r8:80287e08 r7:dfc79e60 r6:84a90080 r5:849cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e4d80 INFO: task kworker/0:7:3216 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e9eee000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3217 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000013 r6:dfc89d8c r5:849c8000 r4:849c8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ebe80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b1b8c r4:858b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b1b8c r4:84a90100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c8000 r8:84a9012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90100 r8:80287e08 r7:dfc85e60 r6:84a90180 r5:849c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e4d80 INFO: task kworker/0:8:3217 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: e9eee000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3221 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:849cd400 r4:849cd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849cd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b278c r4:858b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b278c r4:84a90200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849cd400 r8:84a9022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90200 r8:80287e08 r7:dfc89e60 r6:84a90280 r5:849cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844ef1c0 INFO: task kworker/0:9:3221 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ea520000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3222 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:849ce000 r4:849ce000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ce000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ebf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb293000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b1f8c r4:858b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b1f8c r4:84a90300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ce000 r8:84a9032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90300 r8:80287e08 r7:dfc49e60 r6:84a90380 r5:849ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844ef100 INFO: task kworker/0:10:3222 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ea520000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3227 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:84101800 r4:84101800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84101800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84101800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b238c r4:858b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b238c r4:84a90400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84101800 r8:84a9042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90400 r8:80287e08 r7:dfbede60 r6:84a8e600 r5:84101800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844ef400 INFO: task kworker/0:11:3227 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: eae2e000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3228 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83933c00 r4:83933c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83933c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83933c00 r7:00000000 r6:83018200 r5:00001000 r4:7f74b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8487cb8c r4:8487c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487cb8c r4:84a8e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83933c00 r8:84a8e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e580 r8:80287e08 r7:dfc11e60 r6:84a8e680 r5:83933c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e6780 INFO: task kworker/1:48:3228 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: eae2e000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 r4:00000000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b2f8c r4:858b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b2f8c r4:84a90480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b18c00 r8:84a904ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90480 r8:80287e08 r7:df9fde60 r6:84a8e700 r5:83b18c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844ef400 INFO: task kworker/0:12:3229 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: eb150000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3231 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b2b8c r4:858b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b2b8c r4:84a90500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1ec00 r8:84a9052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90500 r8:80287e08 r7:df9c5e60 r6:84a8e780 r5:83b1ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r5:80000013 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:49:3233 blocked for more than 452 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85cf678c r4:84a8e800 r10:00000000 r9:84a8e800 r8:80287e08 r7:dfc11e60 r6:84a8e880 r5:84a60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e6540 INFO: task kworker/1:49:3233 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: eb5c7000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3236 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfca5d84 r8:00000002 r7:60000113 r6:dfca5d8c r5:84a60c00 r4:84a60c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a60c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f68d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cf938c r4:85cf9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cf938c r4:84a8e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a60c00 r8:84a8e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8e900 r8:80287e08 r7:dfab9e60 r6:84a8e980 r5:84a60c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) r4:848e6b40 Call trace: 9d20: eba59000 ecaed000 00000001 80239b98 7f1f9000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/1:51:3237 blocked for more than 452 seconds. r4:84a61800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a61800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a82cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a61800 r7:00000000 r6:83018200 r5:00001000 r4:7f5b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84872f8c r4:84872c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84872f8c r4:84a8ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a61800 r8:84a8ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8ea00 r8:80287e08 r7:dfab9e60 r6:84a8ea80 r5:84a61800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e6b40 INFO: task kworker/1:51:3237 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: eba59000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3239 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:84a62400 r4:84a62400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a62400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2aa00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f651000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84873b8c r4:84873800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84873b8c r4:84a8eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a62400 r8:84a8eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8eb00 r8:80287e08 r7:dfa29e60 r6:84a8eb80 r5:84a62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e6b40 INFO: task kworker/1:52:3239 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ebeab000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3241 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:84a63000 r4:84a63000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a63000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a82ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a63000 r7:00000000 r6:83018200 r5:00001000 r4:7f5b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c67f8c r4:85c67c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c67f8c r4:84a8ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a63000 r8:84a8ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8ec00 r8:80287e08 r7:dfa29e60 r6:84a8ec80 r5:84a63000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848e6fc0 INFO: task kworker/1:53:3241 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ec450000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:54 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a63c00 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a82bc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a63c00 r8:84a8ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3245 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:84a64800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a64800 r8:84a8ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0045000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c66b8c r4:85c66800 r7:ddde2d80 r6:83018200 r5:85c66b8c r4:84a8ef00 r10:61c88647 r9:84a65400 r8:84a8ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a92240 INFO: task kworker/1:56:3247 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: eca3b000 ecaed000 00000001 80239b98 7f1f9000 00000001 9d40: 82ac15a0 7f1f9000 ecaed000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af778c r4:84af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af778c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3249 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:84a66000 r4:84a66000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a66000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:830cbc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a66000 r7:00000000 r6:83018200 r5:00001000 r4:7f593000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed851000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6738c r4:85c67000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c6738c r4:84836380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a66000 r8:848363ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84836380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84836380 r8:80287e08 r7:dfa89e60 r6:84a99000 r5:84a66000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a92380 INFO: task kworker/1:57:3249 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 7f462000 e0047000 00000001 80239b98 7f07d000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c780 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:8506bc80 task:kworker/1:58 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84a66c00 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f591000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed843000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c66f8c r4:85c66c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c66f8c r4:84a99080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a66c00 r8:84a990ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99080 r8:80287e08 r7:dfa89e60 r6:84a99100 r5:84a66c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a92380 INFO: task kworker/1:58:3250 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 7f538000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r5:84a68000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bbb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a68000 r7:00000000 r6:83018200 r5:00001000 r4:7f519000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed679000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ccdb8c r4:85ccd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ccdb8c r4:84a99180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a68000 r8:84a991ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99180 r8:80287e08 r7:dfa89e60 r6:84a99200 r5:84a68000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a92700 INFO: task kworker/1:59:3253 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 7f83d000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd6b8c r4:85cd6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd6b8c r4:84a99280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a68c00 r8:84a992ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99280 r8:80287e08 r7:dfab5e60 r6:84a99300 r5:84a68c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a92800 INFO: task kworker/1:60:3255 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 7fbdb000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3257 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:84a69800 r4:84a69800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a69800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85957900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a69800 r7:00000000 r6:83018200 r5:00001000 r4:7f4e9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6638c r4:85c66000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c6638c r4:84a99380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a69800 r8:84a993ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99380 r8:80287e08 r7:dfab5e60 r6:84a99400 r5:84a69800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a92a00 INFO: task kworker/1:61:3257 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 7fbdb000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3259 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:84a6a400 r4:84a6a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a6a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85957800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f4e3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c65f8c r4:85c65c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c65f8c r4:84a99480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a6a400 r8:84a994ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99480 r8:80287e08 r7:dfaf9e60 r6:84a99500 r5:84a6a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a92a00 INFO: task kworker/1:62:3259 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 7fe49000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3262 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a6b000 r8:84a995ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 7ff8a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fc000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f57b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edafd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd5f8c r4:85cd5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd5f8c r4:84a99680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a6bc00 r8:84a996ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99680 r8:80287e08 r7:dfb3de60 r6:84a99700 r5:84a6bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a92cc0 INFO: task kworker/1:64:3263 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 80104000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a828c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f5af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6778c r4:85c67400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c6778c r4:84a99780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a6c800 r8:84a997ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99780 r8:80287e08 r7:dfb3de60 r6:84a99800 r5:84a6c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916000 INFO: task kworker/1:65:3264 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 80622000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edc17000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a6d400 r8:84a998ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84a6e000 r4:84a6e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a6e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85632940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f4e9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8487378c r4:84873400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487378c r4:84a99980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a6e000 r8:84a999ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a99980 r8:80287e08 r7:dfcb1e60 r6:84a99a00 r5:84a6e000 r4:84916280 INFO: task kworker/1:67:3270 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 809c2000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:3271 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:84a6ec00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cf2b8c r4:85cf2800 r7:ddde2d80 r6:83018200 r5:85cf2b8c r4:84a99a80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:69 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848c0000 r8:84a99bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a99b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a99b80 r8:80287e08 r7:dfcc5e60 r6:84a99c00 r5:848c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916800 INFO: task kworker/1:69:3274 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 81326000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:70 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r5:00001000 r4:ed67b000 r5:84873f8c r4:84873c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848c0c00 r8:84a99cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:848c1800 r4:8291a680 r4:00000000 r4:00000000 r5:8487d78c r4:8487d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a99d80 r8:80287e08 r7:dfcdde60 r6:84a99e00 r5:848c1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916840 INFO: task kworker/1:71:3278 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 818d5000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3279 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:848c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f6f1000 r5:8487c78c r4:8487c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a99e80 r8:80287e08 r7:dfce9e60 r6:84a99f00 r5:848c2400 INFO: task kworker/1:72:3279 is blocked on a mutex likely owned by task kworker/0:208:3739. 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:73:3282 blocked for more than 452 seconds. r5:848c3000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8487cf8c r4:8487cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848c3000 r8:84a99fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:74:3284 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:74 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd0dd84 r8:00000002 r7:60000113 r6:dfd0dd8c r5:848c3c00 r4:848c3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d88c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6f1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd138c r4:85dd1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85dd138c r4:841ec080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3c00 r8:841ec0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:841ec080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841ec080 r8:80287e08 r7:dfce9e60 r6:841ec100 r5:848c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916d40 INFO: task kworker/1:74:3284 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8239f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r9:83018205 r8:848c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f94f000 r5:8487db8c r4:8487d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487db8c r4:841ec180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c4800 r8:841ec1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:841ec180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841ec180 r8:80287e08 r7:dfce9e60 r6:841ec200 r5:848c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a0bc0 INFO: task kworker/1:75:3285 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8298b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:76:3288 blocked for more than 453 seconds. r4:848c5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r5:00001000 r4:ede85000 r5:8487df8c r4:8487dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848c5400 r8:841ec2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:3289 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd31d84 r8:00000002 r7:60000013 r6:dfd31d8c r5:848c6000 r4:848c6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8487e38c r4:8487e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:841ec380 r8:80287e08 r7:dfd25e60 r6:841ec400 r5:848c6000 INFO: task kworker/1:77:3289 is blocked on a mutex likely owned by task kworker/0:208:3739. Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 82c97000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:848c6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r9:83018205 r8:848c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f947000 r5:8487eb8c r4:8487e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:841ec480 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd51e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:841ed300 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:80:3295 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:80 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd49d84 r8:00000002 r7:60000113 r6:dfd49d8c r5:83ac8c00 r4:83ac8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ac8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85df9f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f945000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8487ef8c r4:8487ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487ef8c r4:841ec680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ac8c00 r8:841ec6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:841ec680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841ec680 r8:80287e08 r7:dfd3de60 r6:841ec700 r5:83ac8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd49fb0 to 0xdfd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841ed4c0 INFO: task kworker/1:80:3295 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 830c9000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:81:3296 blocked for more than 453 seconds. r4:83ac9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd59e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8487f78c r4:8487f400 r10:61c88647 r9:83ac9800 r8:841ec7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 833f6000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3300 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3300 tgid:3300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd65d84 r8:00000002 r7:60000013 r6:dfd65d8c r5:83aca400 r4:83aca400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83aca400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841ea400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f895000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e33f8c r4:85e33c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e33f8c r4:841ec880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aca400 r8:841ec8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:841ed980 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8487fb8c r4:8487f800 r10:61c88647 r9:83acb000 r8:841ec9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:841edac0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:3303 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:3303 tgid:3303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd71d84 r8:00000002 r7:60000113 r6:dfd71d8c r5:83acbc00 r4:83acbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83acbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85df9bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f943000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8487f38c r4:8487f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487f38c r4:841eca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83acbc00 r8:841ecaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:841eca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841eca80 r8:80287e08 r7:dfd89e60 r6:841ecb00 r5:83acbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:84:3303 is blocked on a mutex likely owned by task kworker/0:208:3739. 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd95e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8487ff8c r4:8487fc00 r10:61c88647 r9:83acc800 r8:841ecbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:86:3307 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:86 state:D stack:0 pid:3307 tgid:3307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfda1d84 r8:00000002 r7:60000113 r6:dfda1d8c r5:83acd400 r4:83acd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83acd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d71cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f987000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f67f8c r4:85f67c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f67f8c r4:841ecc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83acd400 r8:841eccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:87:3310 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:87 state:D stack:0 pid:3310 tgid:3310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdadd84 r8:00000002 r7:60000013 r6:dfdadd8c r5:83ace000 r4:83ace000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ace000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d718c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ace000 r7:00000000 r6:83018200 r5:00001000 r4:7f9bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee107000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8498cb8c r4:8498c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8498cb8c r4:841ecd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ace000 r8:841ecdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:841ecd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841ecd80 r8:80287e08 r7:dfda1e60 r6:841ece00 r5:83ace000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a061c0 INFO: task kworker/1:87:3310 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:848c8000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b3f8c r4:858b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b3f8c r4:84a90580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c8000 r8:84a905ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90580 r8:80287e08 r7:df9c5e60 r6:841ece80 r5:848c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841ebd80 INFO: task kworker/0:14:3317 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 84285000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 task:kworker/0:15 state:D stack:0 pid:3319 tgid:3319 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r5:00001000 r4:eb88b000 r5:858b378c r4:858b3400 r7:dddced80 r6:83018000 r5:858b378c r4:84a90600 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:849cb000 r4:849cb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849cb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b3b8c r4:858b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b3b8c r4:84a90680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849cb000 r8:84a906ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90680 r8:80287e08 r7:dfbade60 r6:84a90700 r5:849cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841eb700 INFO: task kworker/0:16:3320 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8484e000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:88:3322 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:88 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdc5d84 r8:00000002 r7:60000113 r6:dfdc5d8c r5:849cec00 r4:00000000 r9:83018205 r8:849cec00 r7:00000000 r6:83018200 r5:00001000 r4:7fa21000 r5:85f7078c r4:85f70400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849cec00 r8:841ecfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3323 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3323 tgid:3323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdc9d84 r8:00000002 r7:60000113 r6:dfdc9d8c r5:83acec00 r4:83acec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83acec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc9e08 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85f71f8c r4:85f71c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:83ff4800 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a05b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ff4800 r7:00000000 r6:83018200 r5:00001000 r4:7fa21000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df957000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f7338c r4:85f73000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f7338c r4:84a0a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ff4800 r8:84a0a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a0a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a0a080 r8:80287e08 r7:dfdc9e60 r6:84a90880 r5:83ff4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a06a00 INFO: task kworker/1:90:3324 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 85131000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3328 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84930c00 r4:84930c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84930c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851caa00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84930c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb91d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b478c r4:858b4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b478c r4:84a90a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84930c00 r8:84a90a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90a00 r8:80287e08 r7:dfbade60 r6:84a90a80 r5:84930c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a0c340 INFO: task kworker/0:17:3328 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8595c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3330 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3330 tgid:3330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdd5d84 r8:00000002 r7:60000113 r6:dfdd5d8c r5:84931800 r4:84931800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84931800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84931800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb905000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b438c r4:858b4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b438c r4:84a90b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84931800 r8:84a90b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90b00 r8:80287e08 r7:dfc05e60 r6:84a90b80 r5:84931800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd5fb0 to 0xdfdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a0c280 INFO: task kworker/0:18:3330 is blocked on a mutex likely owned by task kworker/0:208:3739. Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 85d9a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84932400 r8:84a90c2c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:101:3608 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:101 state:D stack:0 pid:3608 tgid:3608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:849b3000 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509f8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdc38c r4:84bdc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdc38c r4:84822480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b3000 r8:848224ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822480 r8:80287e08 r7:dfe49e60 r6:84822500 r5:849b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:101:3608 is blocked on a mutex likely owned by task kworker/0:208:3739. 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:849b6000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84a7038c r4:84a70000 r10:61c88647 r9:849b6000 r8:848228ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:105:3633 is blocked on a mutex likely owned by task kworker/0:208:3739. Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 861bc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:207:3738 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05d1d84 r8:00000002 r7:60000113 r6:e05d1d8c r5:84893c00 r4:84893c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84893c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850801c0 r5:850f078c r4:850f0400 r10:61c88647 r9:84893c00 r8:8506c6ac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r5:80000013 r4:80239bb0 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:209:3743 blocked for more than 453 seconds. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0063000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7f8c r4:84af7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af7f8c r4:8506c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84895400 r8:8506c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c880 r8:80287e08 r7:e05d1e60 r6:8506c900 r5:84895400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d5fb0 to 0xe05d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850490c0 INFO: task kworker/0:209:3743 is blocked on a mutex likely owned by task kworker/0:208:3739. Call trace: r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05d9fb0 to 0xe05d9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:84896c00 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84896c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0071000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f038c r4:850f0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f038c r4:8506c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84896c00 r8:8506c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c980 r8:80287e08 r7:e05d1e60 r6:8506ca00 r5:84896c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85049e00 INFO: task kworker/0:210:3744 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 86504000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:3747 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:3747 tgid:3747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e5d84 r8:00000002 r7:60000013 r6:e05e5d8c r5:85028000 r4:85028000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85028000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850f0f8c r4:850f0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/0:211:3747 is blocked on a mutex likely owned by task kworker/0:208:3739. 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85028c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03cc000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f0b8c r4:850f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f0b8c r4:8506cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85028c00 r8:8506cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506cb80 r8:80287e08 r7:e05e5e60 r6:8506cc00 r5:85028c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850802c0 INFO: task kworker/0:212:3749 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 86c40000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) task:kworker/0:213 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ede08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850807c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85029800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f138c r4:850f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f138c r4:8506cc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85029800 r8:8506ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506cc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506cc80 r8:80287e08 r7:e05e5e60 r6:8506cd00 r5:85029800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05edfb0 to 0xe05edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850804c0 INFO: task kworker/0:213:3750 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 86eaa000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 Exception stack(0xe05d9fb0 to 0xe05d9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:214 state:D stack:0 pid:3753 tgid:3753 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8502a400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850f178c r4:850f1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f178c r4:8506cd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502a400 r8:8506cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506cd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506cd80 r8:80287e08 r7:e05ede60 r6:8506ce00 r5:8502a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e9fb0 to 0xe05e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080640 INFO: task kworker/0:214:3753 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 86ef8000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:3755 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:3755 tgid:3755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05f5d84 r8:00000002 r7:60000013 r6:e05f5d8c r5:8502b000 r4:8502b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8502b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f1b8c r4:850f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f1b8c r4:8506ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502b000 r8:8506ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ce80 r8:80287e08 r7:e05e9e60 r6:8506cf00 r5:8502b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f5fb0 to 0xe05f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850806c0 INFO: task kworker/0:215:3755 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8722d000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3757 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05f9d84 r8:00000002 r7:60000113 r6:e05f9d8c r5:8502bc00 r4:8502bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8502bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f238c r4:850f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f238c r4:8506cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502bc00 r8:8506cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506cf80 r8:80287e08 r7:e05f5e60 r6:85089000 r5:8502bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f9fb0 to 0xe05f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080900 INFO: task kworker/0:216:3757 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 87603000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3759 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3759 tgid:3759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05fdd84 r8:00000002 r7:60000113 r6:e05fdd8c r5:8502c800 r4:8502c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08 r5:850f1f8c r4:850f1c00 r10:61c88647 r9:8502c800 r8:850890ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85080a00 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3761 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0601d84 r8:00000002 r7:60000013 r6:e0601d8c r5:8502d400 r4:8502d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8502d400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f278c r4:850f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f278c r4:85089180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502d400 r8:850891ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089180 r8:80287e08 r7:e05f9e60 r6:85089200 r5:8502d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0601fb0 to 0xe0601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080bc0 INFO: task kworker/0:218:3761 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Workqueue: events bpf_prog_free_deferred r5:8502e000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502e000 r8:850892ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089280 r8:80287e08 r7:e0601e60 r6:85089300 r5:8502e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0605fb0 to 0xe0605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080d80 INFO: task kworker/0:219:3763 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:8506c780 r4:8506bc80 r10:8291a684 r9:e0609d84 r8:00000002 r7:60000113 r6:e0609d8c r5:8502ec00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850f338c r4:850f3000 r10:61c88647 r9:8502ec00 r8:850893ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85093040 INFO: task kworker/0:220:3765 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 87a85000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:850f2f8c r4:850f2c00 r10:61c88647 r9:84890000 r8:850894ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85093240 INFO: task kworker/0:221:3767 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8811f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850f378c r4:850f3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:223 state:D stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05f1d84 r8:00000002 r7:60000013 r6:e05f1d8c r5:84ab0c00 r4:84ab0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ab0c00 r8:850896ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:223:3771 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 88691000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850936c0 r5:850f3b8c r4:850f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f3b8c r4:85089780 r10:61c88647 r9:84bb0c00 r8:850897ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85093600 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 88691000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:84bb6000 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850fc38c r4:850fc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850fc38c r4:85089800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb6000 r8:8508982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089800 r8:80287e08 r7:e05f1e60 r6:8506a180 r5:84bb6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85093680 INFO: task kworker/0:225:3775 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e062dd84 r8:00000002 r7:60000013 r6:e062dd8c r5:84bb6c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe062dfb0 to 0xe062dff8) Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3778 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0635d84 r8:00000002 r7:60000013 r6:e0635d8c r5:84bb3c00 r4:84bb3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850fc78c r4:850fc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850fc78c r4:85089900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb3c00 r8:8508992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089900 r8:80287e08 r7:e062de60 r6:8506a280 r5:84bb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850937c0 INFO: task kworker/0:227:3778 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/1:106:3782 blocked for more than 454 seconds. r5:84bb4800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:844a8f8c r4:844a8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844a8f8c r4:8506a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb4800 r8:8506a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a300 r8:80287e08 r7:e0435e60 r6:8506a380 r5:84bb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f100 INFO: task kworker/1:106:3782 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 893ca000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 task:kworker/1:107 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0639fb0 to 0xe0639ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 89579000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:3787 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:8496c800 r4:8496c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850fcb8c r4:850fc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850fcb8c r4:85089980 r10:61c88647 r9:8496c800 r8:850899ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85089980 r8:80287e08 r7:e062de60 r6:8506a500 r5:8496c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:108:3789 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:108 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:8496ec00 r4:8496ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509f7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0495000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844aa78c r4:844aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844aa78c r4:8506a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496ec00 r8:8506a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a580 r8:80287e08 r7:e0435e60 r6:8506a600 r5:8496ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f440 INFO: task kworker/1:108:3789 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8993c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) r4:8506bc80 Workqueue: events bpf_prog_free_deferred r4:8496e000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8496e000 r8:85089a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85093e80 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:e05d9dc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:109:3792 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:3792 tgid:3792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0641d84 r8:00000002 r7:60000113 r6:e0641d8c r5:85010000 r4:85010000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85010000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fa40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85010000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdc78c r4:84bdc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdc78c r4:8506a700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85010000 r8:8506a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506a700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a700 r8:80287e08 r7:e0435e60 r6:8506a780 r5:85010000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f800 INFO: task kworker/1:109:3792 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 89c6d000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:110:3795 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:110 state:D stack:0 pid:3795 tgid:3795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e064dd84 r8:00000002 r7:60000113 r6:e064dd8c r5:85010c00 r4:85010c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85010c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85010c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdcb8c r4:84bdc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdcb8c r4:8506a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85010c00 r8:8506a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a800 r8:80287e08 r7:e0641e60 r6:8506a880 r5:85010c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f840 INFO: task kworker/1:110:3795 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8a0cd000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3796 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:85011800 r4:85011800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85011800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850961c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0039000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bddf8c r4:84bddc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bddf8c r4:8506a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85011800 r8:8506a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a900 r8:80287e08 r7:e064de60 r6:8506a980 r5:85011800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f9c0 INFO: task kworker/1:111:3796 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8a0cd000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:112:3798 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:112 state:D stack:0 pid:3798 tgid:3798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0655d84 r8:00000002 r7:60000113 r6:e0655d8c r5:85012400 r4:85012400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85012400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0577000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdcf8c r4:84bdcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdcf8c r4:8506aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85012400 r8:8506aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506aa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506aa00 r8:80287e08 r7:e0651e60 r6:8506aa80 r5:85012400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0655fb0 to 0xe0655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509fc80 INFO: task kworker/1:112:3798 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8a50c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:113:3800 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:113 state:D stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0659d84 r8:00000002 r7:60000013 r6:e0659d8c r5:85013c00 r4:85013c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85013c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85013c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdd78c r4:84bdd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdd78c r4:8506ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85013c00 r8:8506ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ab00 r8:80287e08 r7:e0651e60 r6:8506ab80 r5:85013c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 8a50c000 e0047000 00000001 80239b98 7f07d000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:3803 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:3803 tgid:3803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0671d84 r8:00000002 r7:60000013 r6:e0671d8c r5:85014800 r4:85014800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85014800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85014800 r8:85089aac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3805 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3805 tgid:3805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0679d84 r8:00000002 r7:60000013 r6:e0679d8c r5:85016000 r4:85016000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85016000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85016000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850feb8c r4:850fe800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850feb8c r4:85089b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85016000 r8:85089b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089b00 r8:80287e08 r7:e0671e60 r6:8506ac80 r5:85016000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85087200 INFO: task kworker/0:231:3805 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8ac42000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3806 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85016c00 r8:85089bac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 INFO: task kworker/0:233:3808 blocked for more than 454 seconds. r10:8291a684 r9:e0685d84 r8:00000002 r7:60000113 r6:e0685d8c r5:85015400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850876c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85015400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850fdf8c r4:850fdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850fdf8c r4:85089c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85015400 r8:85089c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089c00 r8:80287e08 r7:e0679e60 r6:8506ad80 r5:85015400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850873c0 INFO: task kworker/0:233:3808 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8b0fa000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850fe38c r4:85089c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089c80 r8:80287e08 r7:e0679e60 r6:8506ae00 r5:84bb8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850874c0 INFO: task kworker/0:234:3810 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8b4d2000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850fe78c r4:85089d00 r10:61c88647 r9:84bba400 r8:85089d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:3815 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:3815 tgid:3815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e069dd84 r8:00000002 r7:60000113 r6:e069dd8c r5:84bbb000 r4:84bbb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bbb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850fef8c r4:850fec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850fef8c r4:85089d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbb000 r8:85089dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089d80 r8:80287e08 r7:e0679e60 r6:8506af00 r5:84bbb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85087880 INFO: task kworker/0:236:3815 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8b78a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:84bbbc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84867480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bbbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ffb8c r4:850ff800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ffb8c r4:85089e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbbc00 r8:85089e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85089e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089e00 r8:80287e08 r7:e069de60 r6:8506af80 r5:84bbbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85087880 INFO: task kworker/0:237:3816 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8ba93000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:3818 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:e0691d84 r8:00000002 r7:60000013 r6:e0691d8c r5:84ab2400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ff38c r4:850ff000 r10:61c88647 r9:84ab2400 r8:85089eac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfe99000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ab4800 r8:85089fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:3824 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06add84 r8:00000002 r7:60000013 r6:e06add8c r5:84bbd400 r4:84bbd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bbd400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510038c r4:85100000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8509ff80 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:241 state:D stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850fff8c r4:85099100 r10:00000000 r9:85099100 r8:80287e08 r7:e06ade60 r6:850a2080 r5:84bbec00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3828 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c1d84 r8:00000002 r7:60000113 r6:e06c1d8c r5:84bb8000 r4:84bb8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a56c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb8000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0073000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510138c r4:85101000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510138c r4:85099180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb8000 r8:850991ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099180 r8:80287e08 r7:e06ade60 r6:850a2100 r5:84bb8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c1fb0 to 0xe06c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850937c0 INFO: task kworker/0:242:3828 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8ca10000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:3830 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c5d84 r8:00000002 r7:60000013 r6:e06c5d8c r5:84bbe000 r4:84bbe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bbe000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510078c r4:85100400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510078c r4:85099200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbe000 r8:8509922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099200 r8:80287e08 r7:e06c1e60 r6:850a2180 r5:84bbe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a5100 INFO: task kworker/0:243:3830 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:3831 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:3831 tgid:3831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c9d84 r8:00000002 r7:60000013 r6:e06c9d8c r5:84bbc800 r4:84bbc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a54c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bbc800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e004f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85100b8c r4:85100800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bbc800 r8:850992ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe06c9fb0 to 0xe06c9ff8) r4:850a5100 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bb9800 r8:850a22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8db93000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3834 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3834 tgid:3834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:85013000 r4:85013000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85013000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85013000 r8:850a23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 8deec000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:116:3836 blocked for more than 454 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bde78c r4:84bde400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bde78c r4:850a2480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8000 r8:850a24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2480 r8:80287e08 r7:e06a5e60 r6:850a2500 r5:849b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850964c0 INFO: task kworker/1:116:3836 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8e514000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85100f8c r4:85099300 r10:00000000 r9:85099300 r8:80287e08 r7:e06c1e60 r6:850a2580 r5:849ba400 r4:850a53c0 Workqueue: events bpf_prog_free_deferred 9d20: 8e78b000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85101b8c r4:85101800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85101b8c r4:85099380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b9800 r8:850993ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099380 r8:80287e08 r7:e06c1e60 r6:850a2600 r5:849b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a5440 INFO: task kworker/0:246:3842 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8ecee000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:3843 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e5d84 r8:00000002 r7:60000113 r6:e06e5d8c r5:849bb000 r4:849bb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0091000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510178c r4:85101400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510178c r4:85099400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bb000 r8:8509942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099400 r8:80287e08 r7:e06e1e60 r6:850a2680 r5:849bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a5440 INFO: task kworker/0:247:3843 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8eedb000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:3845 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:3845 tgid:3845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06edd84 r8:00000002 r7:60000013 r6:e06edd8c r5:849bc800 r4:849bc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510238c r4:85102000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510238c r4:85099480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bc800 r8:850994ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099480 r8:80287e08 r7:e06e1e60 r6:850a2700 r5:849bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a5640 INFO: task kworker/0:248:3845 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8efeb000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:3847 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:3847 tgid:3847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f9d84 r8:00000002 r7:60000113 r6:e06f9d8c r5:849be000 r4:849be000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849be000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849be000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85101f8c r4:85101c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85101f8c r4:85099500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849be000 r8:8509952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099500 r8:80287e08 r7:e06ede60 r6:850a2780 r5:849be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a59c0 INFO: task kworker/0:249:3847 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8f283000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:3849 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:3849 tgid:3849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0701d84 r8:00000002 r7:60000013 r6:e0701d8c r5:849bd400 r4:849bd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a50c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510338c r4:85103000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510338c r4:85099580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bd400 r8:850995ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099580 r8:80287e08 r7:e06ede60 r6:850a2800 r5:849bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0701fb0 to 0xe0701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a59c0 INFO: task kworker/0:250:3849 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8f6c0000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:3851 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0709d84 r8:00000002 r7:60000113 r6:e0709d8c r5:849bbc00 r4:849bbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510278c r4:85102400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510278c r4:85099600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bbc00 r8:8509962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099600 r8:80287e08 r7:e0701e60 r6:850a2880 r5:849bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a5ac0 INFO: task kworker/0:251:3851 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 8f6c0000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 task:kworker/0:252 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: 8fac3000 e0047000 00000001 80239b98 7f07d000 00000001 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:3855 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0729d84 r8:00000002 r7:60000013 r6:e0729d8c r5:85161800 r4:85161800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85161800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85161800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df985000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85102f8c r4:85102c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85102f8c r4:85099700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85161800 r8:8509972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099700 r8:80287e08 r7:e0701e60 r6:850a2980 r5:85161800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a5d00 INFO: task kworker/0:253:3855 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9036f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:254:3858 blocked for more than 454 seconds. r4:85160c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510378c r4:85103400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510378c r4:85099780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85160c00 r8:850997ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099780 r8:80287e08 r7:e0701e60 r6:850a2a00 r5:85160c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0731fb0 to 0xe0731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85093d80 INFO: task kworker/0:254:3858 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9036f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:3860 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:85163000 r4:85163000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85163000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b6140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85163000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85103b8c r4:85103800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85103b8c r4:85099800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85163000 r8:8509982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099800 r8:80287e08 r7:e0731e60 r6:850a2a80 r5:85163000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0735fb0 to 0xe0735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85096080 INFO: task kworker/0:255:3860 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9062e000 e0047000 00000001 80239b98 7f07d000 00000001 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:84ab5400 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510838c r4:85108000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:3864 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:3864 tgid:3864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:84ab6000 r4:84ab6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85103f8c r4:85103c00 r10:61c88647 r9:84ab6000 r8:850999ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:3867 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0739d84 r8:00000002 r7:60000013 r6:e0739d8c r5:84ab6c00 r4:84ab6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b6740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510878c r4:85108400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510878c r4:85099a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab6c00 r8:85099aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099a80 r8:80287e08 r7:e06d1e60 r6:85099b00 r5:84ab6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0755d84 r8:00000002 r7:60000013 r6:e0755d8c r5:84ab3000 r4:84ab3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b68c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab3000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85108b8c r4:85108800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85108b8c r4:85099b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab3000 r8:85099bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099b80 r8:80287e08 r7:e0739e60 r6:85099c00 r5:84ab3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0755fb0 to 0xe0755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b64c0 INFO: task kworker/0:259:3869 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9100c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85108f8c r4:85108c00 r7:dddced80 r6:83018000 r5:85108f8c r4:85099c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab1800 r8:85099cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099c80 r8:80287e08 r7:e0755e60 r6:85099d00 r5:84ab1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe075dfb0 to 0xe075dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b6980 INFO: task kworker/0:260:3871 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9100c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ab3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8510938c r4:85109000 r7:dddced80 r6:83018000 r5:8510938c r4:85099d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:e05d9dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:3875 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0765d84 r8:00000002 r7:60000013 r6:e0765d8c r5:85130000 r4:85130000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85130000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0765e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b6dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85130000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510978c r4:85109400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510978c r4:85099e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85130000 r8:85099eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099e80 r8:80287e08 r7:e0761e60 r6:85099f00 r5:85130000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0765fb0 to 0xe0765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:3878 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0769d84 r8:00000002 r7:60000113 r6:e0769d8c r5:85130c00 r4:85130c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85130c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b6c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85130c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85109b8c r4:85109800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85109b8c r4:85099f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85130c00 r8:85099fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85099f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099f80 r8:80287e08 r7:e0765e60 r6:850c1000 r5:85130c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0769fb0 to 0xe0769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b6c40 INFO: task kworker/0:263:3878 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 91862000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e05d9dc0 r5:00001000 r4:eb0cb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:850b6e00 INFO: task kworker/0:264:3880 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 919b0000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r5:85132400 r4:8291a680 r9:83018005 r8:85132400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:8510ab8c r4:8510a800 r4:850c1180 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:266:3884 blocked for more than 455 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e0463000 r5:8510a38c r4:8510a000 r10:61c88647 r9:85133000 r8:850c12ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4789fb0 to 0xe4789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c4040 INFO: task kworker/0:266:3884 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 91aae000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:3886 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:3886 tgid:3886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e478dd84 r8:00000002 r7:60000013 r6:e478dd8c r5:85133c00 r4:85133c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85133c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e478de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c4100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85133c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510a78c r4:8510a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850c1380 r8:80287e08 r7:e4785e60 r6:850c1400 r5:85133c00 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8291a684 r9:e4791d84 r8:00000002 r7:60000113 r6:e4791d8c r5:85134800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c46c0 r5:8510b38c r4:8510b000 r4:850c1480 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:268:3888 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 920c7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:269:3890 blocked for more than 455 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4795e08 r5:8510af8c r4:8510ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:270:3893 blocked for more than 455 seconds. r5:85136000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8510b78c r4:8510b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850c1680 r8:80287e08 r7:e4791e60 r6:850c1700 r5:85136000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9266b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:3894 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e479dd84 r8:00000002 r7:60000013 r6:e479dd8c r5:85136c00 r4:85136c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85136c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018005 r8:85136c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:8510bb8c r4:8510b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84938000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e47a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511478c r4:85114400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511478c r4:850c1880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84938000 r8:850c18ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c1880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1880 r8:80287e08 r7:e479de60 r6:850c1900 r5:84938000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47a1fb0 to 0xe47a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c4800 INFO: task kworker/0:272:3896 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 92985000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:3897 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e47a5d84 r8:00000002 r7:60000113 r6:e47a5d8c r5:84938c00 r4:84938c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84938c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:8510bf8c r4:8510bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:e47cdd84 r8:00000002 r7:60000013 r6:e47cdd8c r5:84939800 r4:00000000 r7:dddced80 r6:83018000 r5:8511438c r4:850c1a80 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e47d9d84 r8:00000002 r7:60000113 r6:e47d9d8c r5:85164800 r4:85164800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85164800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85164800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea907000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdeb8c r4:84bde800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdeb8c r4:850a2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85164800 r8:850a2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a2b00 r8:80287e08 r7:e06a5e60 r6:850a2b80 r5:85164800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47d9fb0 to 0xe47d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d3200 INFO: task kworker/1:117:3901 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 931f7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:275:3903 blocked for more than 455 seconds. r5:85163c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85114b8c r4:85114800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850c1b80 r8:80287e08 r7:e47a1e60 r6:850a2c00 r5:85163c00 INFO: task kworker/0:275:3903 is blocked on a mutex likely owned by task kworker/0:208:3739. r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:85165400 r4:8291a680 r4:00000000 r9:83018005 r8:85165400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r5:8511638c r4:85116000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511638c r4:850c1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85165400 r8:850c1c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c1c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1c00 r8:80287e08 r7:e47e9e60 r6:850a2c80 r5:85165400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47f9fb0 to 0xe47f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c4dc0 INFO: task kworker/0:276:3905 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 931f7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85166c00 r4:00000000 r5:00001000 r4:e47ef000 r5:85114f8c r4:85114c00 r4:850c1c80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8511538c r4:85115000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850c1d00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dc040 INFO: task kworker/0:278:3908 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 938c6000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:3910 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e881dd84 r8:00000002 r7:60000113 r6:e881dd8c r5:849bec00 r4:849bec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8511578c r4:85115400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/0:279:3910 is blocked on a mutex likely owned by task kworker/0:208:3739. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:3912 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8835d84 r8:00000002 r7:60000113 r6:e8835d8c r5:85168000 r4:85168000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85168000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8835e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dc400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85168000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8825000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85115b8c r4:85115800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85115b8c r4:850c1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85168000 r8:850c1e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1e00 r8:80287e08 r7:e47f9e60 r6:850a2e80 r5:85168000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8835fb0 to 0xe8835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dc340 INFO: task kworker/0:280:3912 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 93aa8000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85169800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85115f8c r4:85115c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850c1f00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:3916 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8855d84 r8:00000002 r7:60000113 r6:e8855d8c r5:85168c00 r4:85168c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85168c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8855e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dc800 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511678c r4:85116400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850c1e80 r8:80287e08 r7:e47f9e60 r6:850a2f80 r5:85168c00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8516a400 r4:00000000 r4:00000000 r5:8511738c r4:85117000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:284:3920 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e886dd84 r8:00000002 r7:60000013 r6:e886dd8c r5:8516b000 r4:8516b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e886de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dc980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8516b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8861000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85116b8c r4:85116800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85116b8c r4:850e9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516b000 r8:850e902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9000 r8:80287e08 r7:e8865e60 r6:85199080 r5:8516b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe886dfb0 to 0xe886dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dc5c0 INFO: task kworker/0:284:3920 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 946c1000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:285:3922 blocked for more than 455 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8875000 r5:85116f8c r4:85116c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:3925 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea89dd84 r8:00000002 r7:60000113 r6:ea89dd8c r5:8516c800 r4:8516c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea89de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dc9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8516c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea89f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511778c r4:85117400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511778c r4:850e9100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516c800 r8:850e912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:850dc9c0 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8516ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8516ec00 r8:850e91ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:3928 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea8b9d84 r8:00000002 r7:60000013 r6:ea8b9d8c r5:8516e000 r4:8516e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8516e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511838c r4:85118000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511838c r4:850e9200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516e000 r8:850e922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9200 r8:80287e08 r7:ea8ade60 r6:85199280 r5:8516e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b9fb0 to 0xea8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dcb80 INFO: task kworker/0:288:3928 is blocked on a mutex likely owned by task kworker/0:208:3739. Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:85117f8c r4:85117c00 r4:850e9280 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:3932 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea8d9d84 r8:00000002 r7:60000113 r6:ea8d9d8c r5:85162400 r4:85162400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85162400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85162400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511938c r4:85119000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511938c r4:850e9300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85162400 r8:850e932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9300 r8:80287e08 r7:ea8b9e60 r6:85199380 r5:85162400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d9fb0 to 0xea8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:290:3932 is blocked on a mutex likely owned by task kworker/0:208:3739. 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:291:3934 blocked for more than 455 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8511878c r4:850e9380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 r5:00001000 r4:eb0cb000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85172400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85172400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85118b8c r4:85118800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85118b8c r4:850e9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85172400 r8:850e942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9400 r8:80287e08 r7:ea8d9e60 r6:85199480 r5:85172400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8f5fb0 to 0xea8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a1100 INFO: task kworker/0:292:3936 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 953c5000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85170000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea905e08 r5:00001000 r4:ea90f000 r5:85118f8c r4:85118c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:118:3941 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:118 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea919d84 r8:00000002 r7:60000113 r6:ea919d8c r5:85173c00 r4:85173c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85173c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:84bdf38c r4:84bdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85173c00 r8:851995ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:118:3941 is blocked on a mutex likely owned by task kworker/0:208:3739. Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea91dd84 r8:00000002 r7:60000113 r6:ea91dd8c r5:85174800 r4:85174800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85174800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85174800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0523000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511a78c r4:8511a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511a78c r4:850e9500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85174800 r8:850e952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9500 r8:80287e08 r7:ea8d9e60 r6:85199680 r5:85174800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea91dfb0 to 0xea91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a12c0 INFO: task kworker/0:294:3942 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea92b000 r5:8511978c r4:85119400 r10:61c88647 r9:85175400 r8:850e95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9580 r8:80287e08 r7:ea91de60 r6:85199700 r5:85175400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea941fb0 to 0xea941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a15c0 INFO: task kworker/0:295:3945 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 95d6b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea945d84 r8:00000002 r7:60000113 r6:ea945d8c r5:85176c00 r4:85176c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85176c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85176c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511b78c r4:8511b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511b78c r4:850e9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85176c00 r8:850e962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9600 r8:80287e08 r7:ea91de60 r6:85199780 r5:85176c00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47d1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7f40 r5:84bdfb8c r4:84bdf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85199800 r8:80287e08 r7:e06a5e60 r6:85199880 r5:85176000 INFO: task kworker/1:119:3951 is blocked on a mutex likely owned by task kworker/0:208:3739. 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:120:3953 blocked for more than 456 seconds. r5:85173000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851e078c r4:851e0400 r7:ddde2d80 r6:83018200 r5:851e078c r4:85199900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85173000 r8:8519992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85199900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199900 r8:80287e08 r7:e47d1e60 r6:85199980 r5:85173000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0725fb0 to 0xe0725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a7d40 INFO: task kworker/1:120:3953 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 96c7c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85171800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bdff8c r4:84bdfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bdff8c r4:85199a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85171800 r8:85199a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85199a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199a00 r8:80287e08 r7:e0725e60 r6:85199a80 r5:85171800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe066dfb0 to 0xe066dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a7800 INFO: task kworker/1:121:3954 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:297:3956 blocked for more than 456 seconds. r5:849b8c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85119f8c r4:85119c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e9680 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:122:3958 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:122 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea94dd84 r8:00000002 r7:60000013 r6:ea94dd8c r5:85178000 r4:85178000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85178000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea94de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85178000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7178c r4:84a71400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7178c r4:85199b80 r4:85199b80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:123:3959 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:123 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea935d84 r8:00000002 r7:60000013 r6:ea935d8c r5:85178c00 r4:85178c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea935e08 r5:00001000 r4:dfe33000 r5:84a7138c r4:84a71000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85199c80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfec1000 r5:84a70f8c r4:84a70c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a70f8c r4:85199d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517a400 r8:85199dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85199d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199d80 r8:80287e08 r7:e0725e60 r6:85199e00 r5:8517a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea955fb0 to 0xea955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a4100 INFO: task kworker/1:124:3962 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9778f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:125:3963 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:8517b000 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:851e038c r4:851e0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851e038c r4:85199e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85199e80 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a4100 INFO: task kworker/1:125:3963 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9778f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:126:3967 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:126 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea951d84 r8:00000002 r7:60000013 r6:ea951d8c r5:8517bc00 r4:8517bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8517bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:851e138c r4:851e1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8517bc00 r8:85199fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851a4840 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8517d400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:851e0b8c r4:851e0800 r10:61c88647 r9:8517d400 r8:850ea0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:128:3971 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:128 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea965d84 r8:00000002 r7:60000013 r6:ea965d8c r5:8517ec00 r4:8517ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8517ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a4900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8517ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e000f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e0f8c r4:851e0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851e0f8c r4:850ea180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517ec00 r8:850ea1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea180 r8:80287e08 r7:ea951e60 r6:850ea200 r5:8517ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a4c00 INFO: task kworker/1:128:3971 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 980d1000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r4:8506bc80 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea969d84 r8:00000002 r7:60000013 r6:ea969d8c r5:8517c800 r4:8517c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8517c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a4fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8517c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511a38c r4:8511a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511a38c r4:850ea280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517c800 r8:850ea2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea280 r8:80287e08 r7:ea951e60 r6:850ea300 r5:8517c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a4c00 INFO: task kworker/1:129:3973 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/1:130:3974 blocked for more than 456 seconds. r4:8517e000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:851e178c r4:851e1400 r10:61c88647 r9:8517e000 r8:850ea3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851a4880 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:131:3975 blocked for more than 456 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:851e1f8c r4:850ea480 Exception stack(0xea971fb0 to 0xea971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a4880 INFO: task kworker/1:131:3975 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 98f4e000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:3979 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:85182400 r4:85182400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85182400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85182400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511b38c r4:8511b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511b38c r4:850e9700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85182400 r8:850e972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9700 r8:80287e08 r7:ea91de60 r6:850ea580 r5:85182400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea97dfb0 to 0xea97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a15c0 INFO: task kworker/0:298:3979 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85180c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8511ab8c r4:8511a800 r10:61c88647 r9:85180c00 r8:850ea62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:133:3982 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea991d84 r8:00000002 r7:60000113 r6:ea991d8c r5:85183000 r4:85183000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85183000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85183000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e1b8c r4:851e1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851e1b8c r4:850ea700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85183000 r8:850ea72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea700 r8:80287e08 r7:ea971e60 r6:850ea780 r5:85183000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8519e180 INFO: task kworker/1:133:3982 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 99519000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 r5:8597c38c r4:8597c000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaadd000 r5:8511af8c r4:8511ac00 r10:61c88647 r9:85183c00 r8:850e97ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 99959000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3986 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea975d84 r8:00000002 r7:60000113 r6:ea975d8c r5:85184800 r4:85184800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85184800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e238c r4:851e2000 r10:61c88647 r9:85184800 r8:850ea8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519e480 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 80000013 ffffffff [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 task:kworker/1:135 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea95de08 r4:00000000 r5:00001000 r4:e0697000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e278c r4:851e2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851e278c r4:850ea980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85185400 r8:850ea9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea980 r8:80287e08 r7:ea975e60 r6:850eaa00 r5:85185400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8519e640 INFO: task kworker/1:135:3988 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9a028000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:136:3991 blocked for more than 456 seconds. r4:85186000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851e2f8c r4:851e2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850eaa80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851e2b8c r4:851e2800 r10:61c88647 r9:85186c00 r8:850eabac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8519e740 INFO: task kworker/1:137:3992 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9a889000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Not tainted 6.15.0-rc7-syzkaller #0 r4:85181800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85181800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:851e378c r4:851e3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85181800 r8:850eacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85179800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85179800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:851e338c r4:851e3000 r10:61c88647 r9:85179800 r8:850eadac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xea9a9fb0 to 0xea9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8519ec40 INFO: task kworker/1:139:3997 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9abe4000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:3998 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9add84 r8:00000002 r7:60000013 r6:ea9add8c r5:848a0000 r4:848a0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e3b8c r4:851e3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851e3b8c r4:850eae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a0000 r8:850eaeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850eae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eae80 r8:80287e08 r7:ea99de60 r6:850eaf00 r5:848a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9adfb0 to 0xea9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8519ed80 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:848a1800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851f038c r4:851f0000 r7:ddde2d80 r6:83018200 r5:851f038c r4:850eaf80 r10:00000000 r9:850eaf80 r8:80287e08 r7:ea9ade60 r6:850df000 r5:848a1800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9abe4000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:4001 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:4001 tgid:4001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9c5d84 r8:00000002 r7:60000013 r6:ea9c5d8c r5:848a2400 r4:848a2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e01c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e3f8c r4:851e3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851e3f8c r4:850df080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a2400 r8:850df0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850df080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850df080 r8:80287e08 r7:ea9c1e60 r6:850df100 r5:848a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c5fb0 to 0xea9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: 9b13b000 e0047000 00000001 80239b98 7f07d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:4005 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b5d84 r8:00000002 r7:60000113 r6:ea9b5d8c r5:848a3000 r4:848a3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f078c r4:851f0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f078c r4:850df180 r10:61c88647 r9:848a3000 r8:850df1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 task:kworker/1:144 state:D stack:0 pid:4006 tgid:4006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:848a3c00 r4:848a3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f0b8c r4:851f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f0b8c r4:850df280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a3c00 r8:850df2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850df280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850df280 r8:80287e08 r7:ea9b5e60 r6:850df300 r5:848a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0240 INFO: task kworker/1:144:4006 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/1:145:4008 blocked for more than 456 seconds. r4:848a4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9dde08 r5:00001000 r4:ea9f1000 r5:851f0f8c r4:851f0c00 r10:61c88647 r9:848a4800 r8:850df3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r5:848a5400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848a5400 r8:850df4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9ba4f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:4012 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa01d84 r8:00000002 r7:60000113 r6:eaa01d8c r5:848a6000 r4:848a6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851f178c r4:851f1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848a6000 r8:850df5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:848a6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 r5:00001000 r4:eaa15000 r5:851f1b8c r4:851f1800 r10:61c88647 r9:848a6c00 r8:850df6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9c49b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851f1f8c r4:851f1c00 r7:ddde2d80 r6:83018200 r5:851f1f8c r4:850df780 r10:61c88647 r9:848a0c00 r8:850df7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850df780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850df780 r8:80287e08 r7:eaa0de60 r6:850df800 r5:848a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa19fb0 to 0xeaa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e08c0 INFO: task kworker/1:149:4016 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9c805000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa45000 r5:851f2b8c r4:851f2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850df880 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85189800 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851f238c r4:851f2000 r7:ddde2d80 r6:83018200 r5:851f238c r4:850df980 r10:61c88647 r9:85189800 r8:850df9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850df980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850df980 r8:80287e08 r7:ea9e9e60 r6:850dfa00 r5:85189800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0c00 INFO: task kworker/1:151:4019 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9cc81000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:152:4020 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa39000 r5:851f278c r4:851f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85188000 r8:850dfaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ca4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8518b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f2f8c r4:851f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f2f8c r4:850dfb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518b000 r8:850dfbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850dfb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dfb80 r8:80287e08 r7:ea9e9e60 r6:850dfc00 r5:8518b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa5dfb0 to 0xeaa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ca100 INFO: task kworker/1:153:4024 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9d162000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/1:154:4026 blocked for more than 456 seconds. r4:8518c800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851f338c r4:850dfc80 r10:00000000 r9:850dfc80 r8:80287e08 r7:eaa5de60 r6:850dfd00 r5:8518c800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/1:155:4029 blocked for more than 456 seconds. r5:8518d400 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851f3b8c r4:851f3800 r7:ddde2d80 r6:83018200 r5:851f3b8c r4:850dfd80 Exception stack(0xeaa75fb0 to 0xeaa75ff8) Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9dcbd000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:4030 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:8493e000 r4:8493e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8493e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ca8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8493e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f378c r4:851f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f378c r4:850dfe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8493e000 r8:850dfeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850dfe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dfe80 r8:80287e08 r7:eaa75e60 r6:850e9800 r5:8493e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa81fb0 to 0xeaa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ca800 INFO: task kworker/1:156:4030 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9dcbd000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:851fc78c r4:850dff00 r4:00000001 r4:850ca6c0 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:4033 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa89d84 r8:00000002 r7:60000013 r6:eaa89d8c r5:8493ec00 r4:8493ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8493ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cac00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8493ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f3f8c r4:851f3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f3f8c r4:850dff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8493ec00 r8:850dffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850dff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dff80 r8:80287e08 r7:eaa85e60 r6:850e9900 r5:8493ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa89fb0 to 0xeaa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r4:e05d9dc0 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa91000 r5:851fc38c r4:851fc000 r10:61c88647 r9:8493bc00 r8:850ce02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8493d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8493d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850caf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8493d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fcb8c r4:851fc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fcb8c r4:850ce080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8493d400 r8:850ce0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ce080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ce080 r8:80287e08 r7:eaa85e60 r6:850e9a00 r5:8493d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cad80 INFO: task kworker/1:160:4037 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9e767000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:4040 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaab5d84 r8:00000002 r7:60000113 r6:eaab5d8c r5:8493c800 r4:8493c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8493c800 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8493c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 r5:851fcf8c r4:851fcc00 r10:61c88647 r9:8493c800 r8:850ce12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:4041 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaac1d84 r8:00000002 r7:60000113 r6:eaac1d8c r5:8493a400 r4:8493a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8493a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c62c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8493a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fd38c r4:851fd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fd38c r4:850ce180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8493a400 r8:850ce1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ce180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ce180 r8:80287e08 r7:eaab5e60 r6:850e9b00 r5:8493a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c6080 INFO: task kworker/1:162:4041 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9eb60000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r4:8506bc80 task:kworker/1:163 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fe38c r4:851fe000 r7:ddde2d80 r6:83018200 r5:851fe38c r4:850ce200 r4:00000001 r4:850c6140 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:4046 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:84998000 r4:84998000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84998000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c6400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84998000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fd78c r4:851fd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fd78c r4:850ce280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84998000 r8:850ce2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ce280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ce280 r8:80287e08 r7:eaad5e60 r6:850e9c00 r5:84998000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:850c6240 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:165:4047 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:165 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:8499a400 r4:8499a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c6640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8499a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fdb8c r4:851fd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fdb8c r4:850ce300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:850ce300 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:166 state:D stack:0 pid:4050 tgid:4050 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4051 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab05d84 r8:00000002 r7:60000013 r6:eab05d8c r5:8518a400 r4:8518a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d76c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 r5:00001000 r4:dfd69000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r4:85190000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85190000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d72c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85190000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85119b8c r4:85119800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85119b8c r4:850e9d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85190000 r8:850e9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9d80 r8:80287e08 r7:eab05e60 r6:850ce500 r5:85190000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47e5fb0 to 0xe47e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7040 INFO: task kworker/0:301:4054 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9fbda000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:4056 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa5b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850e9e80 r8:80287e08 r7:eab05e60 r6:850ce600 r5:85193000 r4:850d71c0 INFO: task kworker/0:303:4058 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: 9fdca000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4061 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfd13000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8512438c r4:850e9f00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfcd5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850ce700 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:168:4065 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8809d84 r8:00000002 r7:60000113 r6:e8809d8c r5:85194800 r4:85194800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85194800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8809e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dd480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85194800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ff38c r4:851ff000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ff38c r4:850ce800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85194800 r8:850ce82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ce800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ce800 r8:80287e08 r7:eab01e60 r6:850ce880 r5:85194800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8809fb0 to 0xe8809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c6e40 INFO: task kworker/1:168:4065 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a039e000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r4:85192400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8859e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85124b8c r4:85124800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85124b8c r4:850e9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85192400 r8:850e9fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9f80 r8:80287e08 r7:eab05e60 r6:850cea00 r5:85192400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8859fb0 to 0xe8859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7740 INFO: task kworker/0:305:4069 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a0b34000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4071 blocked for more than 457 seconds. Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d2080 r8:80287e08 r7:ea899e60 r6:850ceb00 r5:8518ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8a5fb0 to 0xea8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d78c0 INFO: task kworker/0:307:4072 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a0d3a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4074 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8829d84 r8:00000002 r7:60000113 r6:e8829d8c r5:8499b000 r4:8499b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8829e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512538c r4:85125000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512538c r4:850d2100 r10:61c88647 r9:8499b000 r8:850d212c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: a1166000 e0047000 00000001 80239b98 7f07d000 00000001 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4078 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e883dd84 r8:00000002 r7:60000113 r6:e883dd8c r5:8499d400 r4:8499d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e883de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499d400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0493000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85125b8c r4:85125800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85125b8c r4:850d2300 r4:850d2300 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c6380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499e000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0567000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512638c r4:85126000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512638c r4:850d2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499e000 r8:850d242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d2400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d2400 r8:80287e08 r7:ea8a5e60 r6:850d2480 r5:8499e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d1fb0 to 0xea8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7e00 INFO: task kworker/0:311:4081 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85126b8c r4:850d2500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a13ce000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8dde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850d2600 Exception stack(0xea8ddfb0 to 0xea8ddff8) Workqueue: events bpf_prog_free_deferred 9d20: a17ec000 e0047000 00000001 80239b98 7f07d000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84998c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:850e3180 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4088 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea915d84 r8:00000002 r7:60000113 r6:ea915d8c r5:85148000 r4:85148000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85148000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85148000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85126f8c r4:85126c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85148000 r8:850d282c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 r5:00001000 r4:eb0cb000 r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:316 state:D stack:0 pid:4091 tgid:4091 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3600 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e3400 INFO: task kworker/0:316:4091 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a1bac000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4092 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea929d84 r8:00000002 r7:60000013 r6:ea929d8c r5:85149800 r4:85149800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85149800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea929e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85149800 r8:850d2a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:318:4095 blocked for more than 457 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85127f8c r4:85127c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85127f8c r4:850d2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8514a400 r8:850d2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d2b00 r8:80287e08 r7:ea8e9e60 r6:850d2b80 r5:8514a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea931fb0 to 0xea931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e37c0 INFO: task kworker/0:318:4095 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a2252000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: a2706000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:00001000 r4:eb0cb000 r4:8506c780 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4101 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab19d84 r8:00000002 r7:60000113 r6:eab19d8c r5:8514c800 r4:8514c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8514c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8514c800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524cb8c r4:8524c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524cb8c r4:850d2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8514c800 r8:850d2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d2e00 r8:80287e08 r7:eab15e60 r6:850d2e80 r5:8514c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e3b80 INFO: task kworker/0:321:4101 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a2706000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4103 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab1dd84 r8:00000002 r7:60000113 r6:eab1dd8c r5:8514d400 r4:8514d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8514d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8514d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8873000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524d38c r4:8524d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524d38c r4:850d2f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8514d400 r8:850d2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d2f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d2f00 r8:80287e08 r7:eab19e60 r6:850d2f80 r5:8514d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e3d40 INFO: task kworker/0:322:4103 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:4104 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea93dd84 r8:00000002 r7:60000113 r6:ea93dd8c r5:8514e000 r4:8514e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8867000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8524cf8c r4:851ae000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80000013 r4:80239bb0 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4109 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab29d84 r8:00000002 r7:60000013 r6:eab29d8c r5:83d48000 r4:83d48000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d48000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d48000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea891000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524db8c r4:8524d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524db8c r4:851ae200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d48000 r8:851ae22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ae200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae200 r8:80287e08 r7:eab21e60 r6:851ae280 r5:83d48000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab29fb0 to 0xeab29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b4100 INFO: task kworker/0:325:4109 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4110 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab2dd84 r8:00000002 r7:60000013 r6:eab2dd8c r5:83d48c00 r4:83d48c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d48c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d48c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524df8c r4:8524dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524df8c r4:851ae300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d48c00 r8:851ae32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ae300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae300 r8:80287e08 r7:eab29e60 r6:851ae380 r5:83d48c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:851b43c0 Call trace: 9d20: a36d1000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:327 state:D stack:0 pid:4112 tgid:4112 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:83d49800 r8:851ae42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b44c0 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4115 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:83d4b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4980 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab25fb0 to 0xeab25ff8) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a3bbd000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:329 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4c00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: a3bbd000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfc43000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851ae700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9a1d84 r8:00000002 r7:60000113 r6:ea9a1d8c r5:85211800 r4:85211800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85211800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85211800 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524ef8c r4:8524ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524ef8c r4:851ae780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85211800 r8:851ae7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ae780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae780 r8:80287e08 r7:eab3de60 r6:850cec00 r5:85211800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b4bc0 INFO: task kworker/0:331:4120 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a4544000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8525838c r4:85258000 r4:851ae880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b4c40 INFO: task kworker/0:333:4126 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a4b2b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4128 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4128 tgid:4128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab45d84 r8:00000002 r7:60000113 r6:eab45d8c r5:85213c00 r4:85213c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85213c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524fb8c r4:8524f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 9fa0: 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851ae980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae980 r8:80287e08 r7:eab41e60 r6:850cee00 r5:85215400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851bb1c0 INFO: task kworker/0:335:4130 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a4ce4000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:4132 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85214800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r5:00001000 r4:dffbb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851aea00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: a4ce4000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:4134 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:85216000 r4:85216000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85216000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:338:4135 blocked for more than 457 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb6c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85210c00 r8:851aeb2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: a519d000 e0047000 00000001 80239b98 7f07d000 00000001 r5:00001000 r4:eb0cb000 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:85196000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85196000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85258f8c r4:85258c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85258f8c r4:851aeb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196000 r8:851aebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aeb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aeb80 r8:80287e08 r7:eab5de60 r6:851c7000 r5:85196000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851bb4c0 INFO: task kworker/0:339:4137 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a55d7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c780 r4:00000001 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0057000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525938c r4:85259000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525938c r4:851aec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85218c00 r8:851aec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aec00 r8:80287e08 r7:eab5de60 r6:851c7080 r5:85218c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851bb640 INFO: task kworker/0:340:4140 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a5927000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:341:4141 blocked for more than 457 seconds. r4:85219800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bbac0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:851aec80 r8:80287e08 r7:eab5de60 r6:851c7100 r5:85219800 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 task:kworker/0:342 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bbbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85218000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85259b8c r4:85259800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85259b8c r4:851aed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85218000 r8:851aed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aed00 r8:80287e08 r7:eab5de60 r6:851c7180 r5:85218000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851bbb00 INFO: task kworker/0:342:4143 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a5b8e000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8521a400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851aed80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851bb9c0 INFO: task kworker/0:343:4145 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a5e94000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:344:4147 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:8521b000 r4:8521b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bbec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525a38c r4:8525a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525a38c r4:851aee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521b000 r8:851aee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aee00 r8:80287e08 r7:eab5de60 r6:851c7280 r5:8521b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851bbc00 INFO: task kworker/0:344:4147 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a6374000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:4149 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:8521d400 r4:8521d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525a78c r4:8525a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525a78c r4:851aee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521d400 r8:851aeeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aee80 r8:80287e08 r7:eab5de60 r6:851c7300 r5:8521d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851bbc80 INFO: task kworker/0:345:4149 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a6374000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4151 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4151 tgid:4151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:8521c800 r4:8521c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525ab8c r4:8525a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525ab8c r4:851aef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521c800 r8:851aef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851aef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aef00 r8:80287e08 r7:eab5de60 r6:851c7380 r5:8521c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b4e00 INFO: task kworker/0:346:4151 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a6a3a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:347:4153 blocked for more than 457 seconds. r5:83d4c800 r4:8291a680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:83d4c800 r8:851aefac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a6a3a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4156 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:4156 tgid:4156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba5d84 r8:00000002 r7:60000113 r6:eaba5d8c r5:83d4d400 r4:83d4d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d4d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525bb8c r4:8525b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525bb8c r4:85285080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d4d400 r8:852850ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285080 r8:80287e08 r7:eab09e60 r6:85285100 r5:83d4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852871c0 INFO: task kworker/0:348:4156 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a6c97000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ea92d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8525b78c r4:85285180 r10:00000000 r9:85285180 r8:80287e08 r7:eaba5e60 r6:85285200 r5:83d4e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:4160 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:8521ec00 r4:8521ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852875c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525bf8c r4:8525bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525bf8c r4:85285280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521ec00 r8:852852ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285280 r8:80287e08 r7:eaba5e60 r6:851c7400 r5:8521ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85287300 INFO: task kworker/0:350:4160 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 9d20: a714c000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4164 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:83d4ec00 r4:83d4ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d4ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525cb8c r4:8525c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525cb8c r4:85285380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d4ec00 r8:852853ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285380 r8:80287e08 r7:eabc5e60 r6:85285400 r5:83d4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525c78c r4:8525c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525c78c r4:85285480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d4bc00 r8:852854ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285480 r8:80287e08 r7:eabb1e60 r6:85285500 r5:83d4bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85287680 INFO: task kworker/0:353:4166 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a7abf000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85285580 r8:80287e08 r7:eabb1e60 r6:85285600 r5:84b10000 r4:85287800 Call trace: 9d20: a7abf000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:4170 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabcdd84 r8:00000002 r7:60000113 r6:eabcdd8c r5:84b10c00 r4:84b10c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b10c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525cf8c r4:8525cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525cf8c r4:85285680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b10c00 r8:852856ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285680 r8:80287e08 r7:eabc9e60 r6:85285700 r5:84b10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85287980 INFO: task kworker/0:355:4170 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a7c10000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r5:00001000 r4:eb0cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:4172 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd1d84 r8:00000002 r7:60000113 r6:eabd1d8c r5:84b11800 r4:84b11800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b11800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b11800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525d78c r4:8525d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525d78c r4:85285780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b11800 r8:852857ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285780 r8:80287e08 r7:eabc9e60 r6:85285800 r5:84b11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85287b00 INFO: task kworker/0:356:4172 is blocked on a mutex likely owned by task kworker/0:208:3739. r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b12400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525e78c r4:8525e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525e78c r4:85285880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b12400 r8:852858ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285880 r8:80287e08 r7:eabd1e60 r6:85285900 r5:84b12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85287c80 INFO: task kworker/0:357:4174 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:358:4175 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab49d84 r8:00000002 r7:60000113 r6:eab49d8c r5:84b13000 r4:84b13000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b13000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b6f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b13000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa37000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525db8c r4:8525d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525db8c r4:85285980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b13000 r8:852859ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285980 r8:80287e08 r7:eabd5e60 r6:85285a00 r5:84b13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85287e00 INFO: task kworker/0:358:4175 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d20: a86a5000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa4b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b13c00 r8:85285aac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:4180 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe1d84 r8:00000002 r7:60000013 r6:eabe1d8c r5:84b14800 r4:84b14800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b14800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b14800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525e38c r4:8525e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525e38c r4:85285b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b14800 r8:85285bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85285b80 r8:80287e08 r7:eabd5e60 r6:85285c00 r5:84b14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5180 INFO: task kworker/0:360:4180 is blocked on a mutex likely owned by task kworker/0:208:3739. r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaaab000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85285c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d53c0 INFO: task kworker/0:361:4181 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a8d00000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:4183 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:848b8000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fef8c r4:851fec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85285d80 Exception stack(0xeabedfb0 to 0xeabedff8) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:851c7500 r8:80287e08 r7:e8809e60 r6:85285e80 r5:848ba400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dd300 INFO: task kworker/1:170:4187 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: a926b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:4188 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:848b8c00 r4:848b8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525f38c r4:8525f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525f38c r4:85285f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b8c00 r8:85285f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85285f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 r5:8597c38c r4:8597c000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:848bb000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525fb8c r4:8525f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525fb8c r4:852d6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848bb000 r8:852d602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6000 r8:80287e08 r7:eabf9e60 r6:852d6080 r5:848bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5a80 INFO: task kworker/0:364:4191 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4192 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8849d84 r8:00000002 r7:60000113 r6:e8849d8c r5:85216c00 r4:85216c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85216c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8849e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85216c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525f78c r4:8525f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525f78c r4:852d6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85216c00 r8:852d612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6100 r8:80287e08 r7:eabf1e60 r6:851c7580 r5:85216c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8849fb0 to 0xe8849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:4195 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac05d84 r8:00000002 r7:60000113 r6:eac05d8c r5:8521e000 r4:8521e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525ff8c r4:8525fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8525ff8c r4:852d6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521e000 r8:852d61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6180 r8:80287e08 r7:eabf1e60 r6:851c7600 r5:8521e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5e00 INFO: task kworker/0:366:4195 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:367:4196 blocked for more than 458 seconds. r10:8291a684 r9:eac09d84 r8:00000002 r7:60000013 r6:eac09d8c r5:85220000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85220000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85268b8c r4:85268800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85268b8c r4:852d6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85220000 r8:852d622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6200 r8:80287e08 r7:eac05e60 r6:851c7680 r5:85220000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5f00 INFO: task kworker/0:367:4196 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: aa086000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:368:4200 blocked for more than 458 seconds. r4:85220c00 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526838c r4:85268000 r7:dddced80 r6:83018000 r5:8526838c r4:852d6280 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: aa086000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:171:4201 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:171 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:85221800 r4:85221800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85221800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cd280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84a71f8c r4:851c7780 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852d6300 r8:80287e08 r7:eac09e60 r6:851c7880 r5:85222400 r4:852d91c0 Call trace: 9d20: aa69a000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:4205 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:85223c00 r4:85223c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85223c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d95c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85223c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85268f8c r4:85268c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85268f8c r4:852d6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223c00 r8:852d63ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6380 r8:80287e08 r7:eac09e60 r6:851c7900 r5:85223c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d9300 INFO: task kworker/0:370:4205 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e072b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:852d6400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:4208 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac25d84 r8:00000002 r7:60000013 r6:eac25d8c r5:85226000 r4:85226000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85226000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85226000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0413000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526938c r4:85269000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526938c r4:852d6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85226000 r8:852d64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6480 r8:80287e08 r7:eac21e60 r6:851c7a00 r5:85226000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac25fb0 to 0xeac25ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:373:4211 blocked for more than 458 seconds. r5:85224800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:852d6500 Exception stack(0xeac31fb0 to 0xeac31ff8) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eac35d84 r8:00000002 r7:60000113 r6:eac35d8c r5:85223000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85223000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85269b8c r4:85269800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85269b8c r4:852d6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223000 r8:852d65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6580 r8:80287e08 r7:eac21e60 r6:851c7b00 r5:85223000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac35fb0 to 0xeac35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d96c0 INFO: task kworker/0:374:4212 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ab7cc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:375:4214 blocked for more than 458 seconds. r10:8291a684 r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:85228c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85228c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0569000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85269f8c r4:85269c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85269f8c r4:852d6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85228c00 r8:852d662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6600 r8:80287e08 r7:eac21e60 r6:851c7b80 r5:85228c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d99c0 INFO: task kworker/0:375:4214 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ab7cc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r5:00001000 r4:e061f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8522a400 r8:852d66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d9880 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ab7cc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:4218 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac01d84 r8:00000002 r7:60000013 r6:eac01d8c r5:848bbc00 r4:848bbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848bbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526a78c r4:852d6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848bbc00 r8:852d672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:378:4220 blocked for more than 458 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8526af8c r4:852d6800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) task:kworker/0:379 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dd080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848be000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526b38c r4:8526b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526b38c r4:852d6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848be000 r8:852d692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6900 r8:80287e08 r7:eac4de60 r6:852d6980 r5:848be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dd0c0 INFO: task kworker/0:379:4223 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: abe63000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:380 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852d6a00 r8:80287e08 r7:eac51e60 r6:852d6a80 r5:848bec00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4227 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:848bc800 r4:848bc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848bc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526b78c r4:8526b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526b78c r4:852d6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848bc800 r8:852d6b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6b00 r8:80287e08 r7:eac55e60 r6:852d6b80 r5:848bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5600 INFO: task kworker/0:381:4227 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526bf8c r4:8526bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526bf8c r4:852d6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b9800 r8:852d6c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6c00 r8:80287e08 r7:eac55e60 r6:852d6c80 r5:848b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f7000 INFO: task kworker/0:382:4229 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ac959000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4231 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:84b16c00 r4:84b16c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b16c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: acdff000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) task:kworker/0:384 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: acdff000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4236 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac61d84 r8:00000002 r7:60000013 r6:eac61d8c r5:8522b000 r4:8522b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f78c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522b000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526cb8c r4:8526c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526cb8c r4:852d6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522b000 r8:852d6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6f00 r8:80287e08 r7:eac65e60 r6:851c7c80 r5:8522b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f7500 INFO: task kworker/0:385:4236 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ad278000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85229800 r8:852d6fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ad278000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:4240 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac71d84 r8:00000002 r7:60000113 r6:eac71d8c r5:8522bc00 r4:8522bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f7b40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526d38c r4:8526d000 r7:dddced80 r6:83018000 r5:8526d38c r4:852f8000 r4:852f8000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:172:4241 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:172 state:D stack:0 pid:4241 tgid:4241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac75d84 r8:00000002 r7:60000113 r6:eac75d8c r5:8522c800 r4:8522c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f6a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8522c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fff8c r4:851ffc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fff8c r4:851c7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522c800 r8:851c7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7e00 r8:80287e08 r7:eac0de60 r6:851c7e80 r5:8522c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:4245 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:8522e000 r4:8522e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f7e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea921000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526db8c r4:8526d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526db8c r4:852f8100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522e000 r8:852f812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8100 r8:80287e08 r7:eac79e60 r6:851c7f80 r5:8522e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f7b00 INFO: task kworker/0:389:4245 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8526df8c r4:852f8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522ec00 r8:852f81ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8180 r8:80287e08 r7:eac7de60 r6:852f9000 r5:8522ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f7c00 INFO: task kworker/0:390:4247 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ae0d2000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:173:4249 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:85228000 r4:85228000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85228000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537f38c r4:8537f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: ae525000 e0047000 00000001 80239b98 7f07d000 00000001 r4:00000000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eac89d84 r8:00000002 r7:60000013 r6:eac89d8c r5:85226c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f2040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526e38c r4:8526e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526e38c r4:852f8200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85226c00 r8:852f822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8200 r8:80287e08 r7:eac69e60 r6:852f9180 r5:85226c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f7c00 INFO: task kworker/0:391:4251 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ae846000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85230c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8526e78c r4:852f8280 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:00001000 r4:eb0cb000 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eacaf000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526ef8c r4:8526ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526ef8c r4:852f8300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85231800 r8:852f832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8300 r8:80287e08 r7:eac95e60 r6:852f9280 r5:85231800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f2180 INFO: task kworker/0:393:4255 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: aec36000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:4256 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:4256 tgid:4256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacadd84 r8:00000002 r7:60000113 r6:eacadd8c r5:85232400 r4:85232400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85232400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f2480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85232400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526eb8c r4:8526e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526eb8c r4:852f8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85232400 r8:852f83ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8380 r8:80287e08 r7:eaca1e60 r6:852f9300 r5:85232400 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eacbb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85233000 r8:852f842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8400 r8:80287e08 r7:eaca1e60 r6:852f9380 r5:85233000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f2340 INFO: task kworker/0:395:4259 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: aec36000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526f78c r4:8526f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eacd7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: af324000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4265 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacedd84 r8:00000002 r7:60000013 r6:eacedd8c r5:85234800 r4:85234800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85234800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f2dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85234800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527478c r4:85274400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85234800 r8:852f85ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eace3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8526ff8c r4:852f8600 Exception stack(0xeacf1fb0 to 0xeacf1ff8) Workqueue: events bpf_prog_free_deferred 9d20: afa41000 e0047000 00000001 80239b98 7f07d000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eacf7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527438c r4:85274000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527438c r4:852f8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b20000 r8:852f86ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8680 r8:80287e08 r7:eacede60 r6:852f8700 r5:84b20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac81fb0 to 0xeac81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f2b00 INFO: task kworker/0:400:4268 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: afa41000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4273 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead11d84 r8:00000002 r7:60000113 r6:ead11d8c r5:84b23c00 r4:84b23c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b23c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533b100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527538c r4:85275000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527538c r4:852f8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b23c00 r8:852f88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8880 r8:80287e08 r7:eacf5e60 r6:852f8900 r5:84b23c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f2c40 INFO: task kworker/0:402:4273 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:403:4275 blocked for more than 458 seconds. r5:84b25400 r4:8291a680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:852f8980 Exception stack(0xead1dfb0 to 0xead1dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:84b24800 r4:84b24800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b24800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533b400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527578c r4:85275400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527578c r4:852f8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b24800 r8:852f8aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8a80 r8:80287e08 r7:ead11e60 r6:852f8b00 r5:84b24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533b080 INFO: task kworker/0:404:4277 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: afd60000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:df9cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:406:4281 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:406 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:84b26c00 r4:84b26c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b26c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533b680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85275f8c r4:85275c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85275f8c r4:852f8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b26c00 r8:852f8cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8c80 r8:80287e08 r7:eac91e60 r6:852f8d00 r5:84b26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533b280 INFO: task kworker/0:406:4281 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533b500 INFO: task kworker/0:407:4283 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b061e000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527678c r4:85276400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533bb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b21800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85276b8c r4:85276800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85276b8c r4:852f8f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b21800 r8:852f8fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f8f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f8f80 r8:80287e08 r7:eab65e60 r6:85345000 r5:84b21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:00001000 r4:eb0cb000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xead39fb0 to 0xead39ff8) [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4291 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead3dd84 r8:00000002 r7:60000013 r6:ead3dd8c r5:84b18000 r4:84b18000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b18000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533be40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527738c r4:85277000 r7:dddced80 r6:83018000 r5:8527738c r4:85345180 r4:85345180 r10:00000000 r9:85345180 r8:80287e08 r7:ead39e60 r6:85345200 r5:84b18000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533b900 INFO: task kworker/0:411:4291 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b0d05000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 r5:00001000 r4:eb0cb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:84b18c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85277f8c r4:85277c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:4295 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead45d84 r8:00000002 r7:60000013 r6:ead45d8c r5:84b19800 r4:84b19800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b19800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533bfc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b19800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527778c r4:85277400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527778c r4:85345380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b19800 r8:853453ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85345380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85345380 r8:80287e08 r7:ead41e60 r6:85345400 r5:84b19800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533bf80 INFO: task kworker/0:413:4295 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b0fb9000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r5:84b1a400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b0fb9000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:4299 blocked for more than 458 seconds. r4:84b1bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534c440 INFO: task kworker/0:416:4301 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b15a0000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:4303 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b1a9b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4307 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4307 tgid:4307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead5dd84 r8:00000002 r7:60000113 r6:ead5dd8c r5:84b1ec00 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e0703000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xead5dfb0 to 0xead5dff8) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534ccc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528178c r4:85281400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528178c r4:85345a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b1b000 r8:85345aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85345a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85345a80 r8:80287e08 r7:ead5de60 r6:85345b00 r5:84b1b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534ca00 INFO: task kworker/0:420:4309 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b1f09000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:4311 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:4311 tgid:4311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead65d84 r8:00000002 r7:60000113 r6:ead65d8c r5:84b68000 r4:84b68000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b68000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534ce80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: b1f09000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc7-syzkaller #0 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f7ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528238c r4:85282000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528238c r4:85345c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b68c00 r8:85345cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85345c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85345c80 r8:80287e08 r7:ead65e60 r6:85345d00 r5:84b68c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534cd00 INFO: task kworker/0:422:4313 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b227a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85281f8c r4:85345d80 r4:00000001 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4318 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:84b6a400 r4:84b6a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b6a400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85282b8c r4:85282800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85282b8c r4:85345e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6a400 r8:85345eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85345e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85345e80 r8:80287e08 r7:ead69e60 r6:85345f00 r5:84b6a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e040 INFO: task kworker/0:424:4318 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b24d9000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506bc80 r4:84b6bc00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: b2989000 e0047000 00000001 80239b98 7f07d000 00000001 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead7dd84 r8:00000002 r7:60000013 r6:ead7dd8c r5:84b6c800 r4:84b6c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528378c r4:85283400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528378c r4:85358180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6c800 r8:853581ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85358180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85358180 r8:80287e08 r7:ead79e60 r6:85358200 r5:84b6c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e340 INFO: task kworker/0:427:4323 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b2989000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:4324 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead85d84 r8:00000002 r7:60000113 r6:ead85d8c r5:84b6d400 r4:84b6d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8528338c r4:85283000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b6d400 r8:853582ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85358280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85358280 r8:80287e08 r7:ead7de60 r6:85358300 r5:84b6d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead85fb0 to 0xead85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e340 INFO: task kworker/0:428:4324 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b2be3000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r5:00001000 r4:eaa6d000 r5:85283b8c r4:85283800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b6e000 r8:8535842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4329 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:84b6ec00 r4:84b6ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535eb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85283f8c r4:85283c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85283f8c r4:85358380 r4:85358380 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:852b8000 r8:853585ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4333 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:852b8c00 r4:852b8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ee80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537c78c r4:8537c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537c78c r4:85358680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b8c00 r8:853586ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85358680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85358680 r8:80287e08 r7:ead91e60 r6:85358700 r5:852b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535eac0 INFO: task kworker/0:432:4333 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b324f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:8537cb8c r4:8537c800 r7:dddced80 r6:83018000 r5:8537cb8c r4:85358780 r10:00000000 r9:85358780 r8:80287e08 r7:ead95e60 r6:85358800 r5:852b9800 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 80000013 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4337 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead9dd84 r8:00000002 r7:60000013 r6:ead9dd8c r5:852ba400 r4:852ba400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ba400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85338c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852ba400 r8:853588ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b3de5000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eada1d84 r8:00000002 r7:60000113 r6:eada1d8c r5:852bb000 r4:00000000 r4:00000000 r5:8537d38c r4:8537d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4342 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4342 tgid:4342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada9d84 r8:00000002 r7:60000113 r6:eada9d8c r5:852bbc00 r4:852bbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852bbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537df8c r4:8537dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537df8c r4:85358a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852bbc00 r8:85358aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85358a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85358a80 r8:80287e08 r7:eada1e60 r6:85358b00 r5:852bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85375000 INFO: task kworker/0:436:4342 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000001 task:kworker/0:437 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537d78c r4:8537d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537d78c r4:85358b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852bc800 r8:85358bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85358b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85358b80 r8:80287e08 r7:eada9e60 r6:85358c00 r5:852bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85375400 INFO: task kworker/0:437:4343 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d20: b3de5000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:852bd400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8537db8c r4:8537d800 r10:61c88647 r9:852bd400 r8:85358cac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:e05d9dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:439:4347 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:852be000 r4:852be000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852be000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853757c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537e38c r4:8537e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537e38c r4:85358d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852be000 r8:85358dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85358d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85358d80 r8:80287e08 r7:eada9e60 r6:85358e00 r5:852be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb5fb0 to 0xeadb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85375500 INFO: task kworker/0:439:4347 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b445f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:852bec00 r8:85358eac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85375880 INFO: task kworker/0:440:4349 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b465e000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:4351 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85298000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8537ef8c r4:8537ec00 r7:dddced80 r6:83018000 r5:8537ef8c r4:85358f80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eadd7000 r5:8537eb8c r4:8537e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4355 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead89d84 r8:00000002 r7:60000113 r6:ead89d8c r5:8529a400 r4:8529a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b9040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537fb8c r4:8537f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537fb8c r4:853bc180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529a400 r8:853bc1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc180 r8:80287e08 r7:eadc9e60 r6:853bc200 r5:8529a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead89fb0 to 0xead89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85375ac0 INFO: task kworker/0:443:4355 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8537f78c r4:8537f400 r7:dddced80 r6:83018000 r5:8537f78c r4:853bc280 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8523a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b9280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537ff8c r4:8537fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537ff8c r4:853bc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523a400 r8:853bc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc300 r8:80287e08 r7:ead89e60 r6:852f9680 r5:8523a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b91c0 INFO: task kworker/0:445:4361 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b5113000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05d9fb0 to 0xe05d9ff8) r10:8291a684 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:8523b000 r5:8538838c r4:85388000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538838c r4:853bc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523b000 r8:853bc3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc380 r8:80287e08 r7:eae21e60 r6:852f9700 r5:8523b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae3dfb0 to 0xeae3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b9100 INFO: task kworker/0:446:4363 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b5113000 e0047000 00000001 80239b98 7f07d000 00000001 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8523d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r5:8538878c r4:85388400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853bc400 r8:80287e08 r7:eae3de60 r6:852f9780 r5:8523d400 INFO: task kworker/0:447:4365 is blocked on a mutex likely owned by task kworker/0:208:3739. Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:448:4366 blocked for more than 459 seconds. r4:8523bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85389b8c r4:85389800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85389b8c r4:853bc480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523bc00 r8:853bc4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc480 r8:80287e08 r7:eae49e60 r6:852f9800 r5:8523bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b9200 INFO: task kworker/0:448:4366 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b5596000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:449:4368 blocked for more than 459 seconds. [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85388b8c r4:85388800 r10:00000000 r9:853bc500 r8:80287e08 r7:eae55e60 r6:852f9880 r5:8523ec00 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:00000000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4370 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac9dd84 r8:00000002 r7:60000113 r6:eac9dd8c r5:8523c800 r4:8523c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Workqueue: events bpf_prog_free_deferred r4:85238c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85238c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b9940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538938c r4:85389000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538938c r4:853bc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85238c00 r8:853bc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc600 r8:80287e08 r7:eae55e60 r6:852f9980 r5:85238c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc1fb0 to 0xeacc1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:e05d9dc0 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538978c r4:85389400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538978c r4:853bc680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85238000 r8:853bc6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc680 r8:80287e08 r7:eae55e60 r6:852f9a00 r5:85238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b97c0 INFO: task kworker/0:452:4374 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506bc80 r4:8523e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b9e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523e000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85389f8c r4:85389c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85389f8c r4:853bc700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523e000 r8:853bc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc700 r8:80287e08 r7:eae55e60 r6:852f9a80 r5:8523e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae01fb0 to 0xeae01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b9b40 INFO: task kworker/0:453:4378 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b60e3000 e0047000 00000001 80239b98 7f07d000 00000001 r5:80000013 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05d9fb0 to 0xe05d9ff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r5:8538a78c r4:8538a400 r7:dddced80 r6:83018000 r5:8538a78c r4:853bc780 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b9c80 INFO: task kworker/0:454:4380 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 Exception stack(0xe05d9fb0 to 0xe05d9ff8) task:kworker/0:455 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8538a38c r4:8538a000 r7:dddced80 r6:83018000 r5:8538a38c r4:853bc800 r4:853bc800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc800 r8:80287e08 r7:eacb5e60 r6:852f9b80 r5:85230000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b99c0 INFO: task kworker/0:455:4381 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b60e3000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 r4:84b70000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8538b78c r4:8538b400 r10:00000000 r9:852f9c00 r8:80287e08 r7:eac0de60 r6:852f9c80 r5:84b70000 Call trace: [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8538ab8c r4:8538a800 r10:61c88647 r9:84b70c00 r8:853bc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc880 r8:80287e08 r7:eacb5e60 r6:852f9d00 r5:84b70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace9fb0 to 0xeace9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c9100 INFO: task kworker/0:456:4385 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b681f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:4387 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead05d84 r8:00000002 r7:60000013 r6:ead05d8c r5:84b71800 r4:84b71800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b71800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05d9fb0 to 0xe05d9ff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9500 r7:dddced80 r6:83018000 r5:8538b38c r4:853bc980 INFO: task kworker/0:458:4389 is blocked on a mutex likely owned by task kworker/0:208:3739. r4:e05d9dc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:4390 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:4390 tgid:4390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead19d84 r8:00000002 r7:60000013 r6:ead19d8c r5:84b73000 r4:84b73000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b73000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b73000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538bf8c r4:8538bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538bf8c r4:853bca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b73000 r8:853bca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bca00 r8:80287e08 r7:ead0de60 r6:852f9e80 r5:84b73000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c9240 INFO: task kworker/0:459:4390 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d20: b71ad000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b73c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cd440 r5:84a71b8c r4:84a71800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a71b8c r4:852f9f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b73c00 r8:852f9f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852f9f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f9f00 r8:80287e08 r7:eac0de60 r6:852f9f80 r5:84b73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf5fb0 to 0xeadf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cd100 INFO: task kworker/1:175:4394 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b71ad000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:84b74800 r4:8291a680 r4:00000000 r9:83018005 r8:84b74800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:8538c78c r4:8538c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ead25d84 r8:00000002 r7:60000113 r6:ead25d8c r5:84b75400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cd700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b75400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea885000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531478c r4:85314400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531478c r4:853cb080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b75400 r8:853cb0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cb080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cb080 r8:80287e08 r7:eadf5e60 r6:853cb100 r5:84b75400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cd2c0 INFO: task kworker/1:176:4396 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b7428000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:4399 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:84b76000 r4:84b76000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8531438c r4:85314000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae65fb0 to 0xeae65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cd3c0 INFO: task kworker/1:177:4399 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b77a0000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8538bb8c r4:8538b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05d9fb0 to 0xe05d9ff8) Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d4680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85314f8c r4:85314c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85314f8c r4:853cb380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0000 r8:853cb3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cb380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cb380 r8:80287e08 r7:eae75e60 r6:853cb400 r5:853f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cd580 INFO: task kworker/1:179:4403 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b7b33000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:853f1800 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:180:4407 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:180 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae89d84 r8:00000002 r7:60000113 r6:eae89d8c r5:853f2400 r4:853f2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d4580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85314b8c r4:85314800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85314b8c r4:853cb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f2400 r8:853cb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cb500 r8:80287e08 r7:eae79e60 r6:853cb580 r5:853f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cd900 INFO: task kworker/1:180:4407 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:462:4409 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae91d84 r8:00000002 r7:60000013 r6:eae91d8c r5:853f0c00 r4:853f0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538e78c r4:8538e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538e78c r4:853bcb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0c00 r8:853bcbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bcb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bcb80 r8:80287e08 r7:ead31e60 r6:853cb600 r5:853f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c9e80 INFO: task kworker/0:462:4409 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b8577000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:463:4410 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4410 tgid:4410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae95d84 r8:00000002 r7:60000113 r6:eae95d8c r5:853f3c00 r4:853f3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:853f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:8538cb8c r4:8538c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853bcc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:464:4413 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:853f6000 r4:853f6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538cf8c r4:8538cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538cf8c r4:853bcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6000 r8:853bccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bcc80 r8:80287e08 r7:eae91e60 r6:853cb700 r5:853f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c9a80 INFO: task kworker/0:464:4413 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b8577000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e05d9dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08 r9:83018005 r8:853f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 r5:8538d38c r4:8538d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac2d000 r5:8538d78c r4:8538d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538d78c r4:853bcd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6c00 r8:853bcdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bcd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bcd80 r8:80287e08 r7:eae91e60 r6:853cb800 r5:853f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeddfb0 to 0xeaeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853b9f80 INFO: task kworker/0:466:4416 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b8d93000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:467:4419 blocked for more than 460 seconds. r5:85240c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8538db8c r4:8538d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85240c00 r8:853bce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bce00 r8:80287e08 r7:eae91e60 r6:853cb880 r5:85240c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cf080 INFO: task kworker/0:467:4419 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b8d93000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85241800 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85241800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538df8c r4:8538dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538df8c r4:853bce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85241800 r8:853bceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853bce80 r10:00000000 r9:853bce80 r8:80287e08 r7:eae91e60 r6:853cb900 r5:85241800 r4:853cf200 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaef5fb0 to 0xeaef5ff8) r4:853cf340 INFO: task kworker/0:469:4423 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: b90af000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4425 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef9d84 r8:00000002 r7:60000013 r6:eaef9d8c r5:85243000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae9b000 r5:8538eb8c r4:8538e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853bcf80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08 r5:8538ef8c r4:8538ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8529bc00 r8:853ce02c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:4428 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaefdd84 r8:00000002 r7:60000113 r6:eaefdd8c r5:8529c800 r4:8529c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6d000 r5:8531638c r4:85316000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8529c800 r8:853cbaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:4429 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:85243c00 r4:85243c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85243c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d4880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531538c r4:85315000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531538c r4:853cbb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85243c00 r8:853cbbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cbb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cbb80 r8:80287e08 r7:eaefde60 r6:853cbc00 r5:85243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r4:8506c780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8538f38c r4:8538f000 r10:61c88647 r9:85244800 r8:853ce12c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:4436 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85245400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538fb8c r4:8538f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538fb8c r4:853ce180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85245400 r8:853ce1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ce180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ce180 r8:80287e08 r7:eaf01e60 r6:853cbd00 r5:85245400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cfa80 INFO: task kworker/0:473:4436 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ba03b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:4438 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:85246000 r4:85246000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85246000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cfd40 r5:8538f78c r4:8538f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85246000 r8:853ce22c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa8d000 r5:85315f8c r4:85315c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853cbe00 r8:80287e08 r7:eaefde60 r6:853cbe80 r5:85246c00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4442 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadddd84 r8:00000002 r7:60000013 r6:eadddd8c r5:85242400 r4:85242400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85242400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85242400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538ff8c r4:8538fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538ff8c r4:853ce280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85242400 r8:853ce2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ce280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ce280 r8:80287e08 r7:eae81e60 r6:853cbf00 r5:85242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cfc40 INFO: task kworker/0:475:4442 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 Exception stack(0xe05d9d28 to 0xe05d9d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:476:4444 blocked for more than 460 seconds. r5:853f3000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539038c r4:85390000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853ce300 r8:80287e08 r7:eaddde60 r6:853cbf80 r5:853f3000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4446 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae1dd84 r8:00000002 r7:60000013 r6:eae1dd8c r5:85428c00 r4:85428c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85428c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cff00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85428c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0003000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539078c r4:85390400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853ce380 r8:80287e08 r7:eadfde60 r6:853d6000 r5:85428c00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:4448 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf21d84 r8:00000002 r7:60000113 r6:eaf21d8c r5:8542a400 r4:8542a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542a400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85391b8c r4:85391800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85391b8c r4:853ce400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542a400 r8:853ce42c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:00001000 r4:eb0cb000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4449 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf25d84 r8:00000002 r7:60000113 r6:eaf25d8c r5:85428000 r4:85428000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85428000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9640 r5:85390b8c r4:85390800 r10:00000000 r9:853ce480 r8:80287e08 r7:eaf21e60 r6:853d6100 r5:85428000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r5:00001000 r4:eb0cb000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r10:8291a684 r9:eaf2dd84 r8:00000002 r7:60000113 r6:eaf2dd8c r5:85429800 r4:00000000 r5:85390f8c r4:85390c00 r4:853ce500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ce500 r8:80287e08 r7:eaf21e60 r6:853d6180 r5:85429800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf2dfb0 to 0xeaf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d4cc0 INFO: task kworker/0:480:4451 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bb3a2000 e0047000 00000001 80239b98 7f07d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2280 r5:8539138c r4:85391000 Exception stack(0xeaf39fb0 to 0xeaf39ff8) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4455 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:8542bc00 r4:8542bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0681000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539178c r4:85391400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539178c r4:853ce600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542bc00 r8:853ce62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ce600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ce600 r8:80287e08 r7:eaf21e60 r6:853d6280 r5:8542bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d60: 80230ad0 80239bb0 80000013 ffffffff r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:00000001 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85391f8c r4:85391c00 r10:61c88647 r9:8542c800 r8:853ce6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ce680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ce680 r8:80287e08 r7:eaf21e60 r6:853d6300 r5:8542c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d22c0 INFO: task kworker/0:483:4458 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bbb16000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8529e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539238c r4:85392000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853ce700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4462 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf4dd84 r8:00000002 r7:60000013 r6:eaf4dd8c r5:8529ec00 r4:8529ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2980 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8539278c r4:85392400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eaf51d84 r8:00000002 r7:60000013 r6:eaf51d8c r5:8529d400 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85392b8c r4:85392800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85392b8c r4:853ce900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529d400 r8:853ce92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ce900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ce900 r8:80287e08 r7:eaf4de60 r6:853ce980 r5:8529d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d2800 INFO: task kworker/0:486:4464 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bbf64000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8529b000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85392f8c r4:85392c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8529b000 r8:853cea2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4468 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4468 tgid:4468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadf1d84 r8:00000002 r7:60000013 r6:eadf1d8c r5:84b08000 r4:84b08000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b08000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b08000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539338c r4:85393000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853ceb00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:4470 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df881d84 r8:00000002 r7:60000113 r6:df881d8c r5:84b09800 r4:84b09800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b09800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df881e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b09800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539378c r4:85393400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539378c r4:853cec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b09800 r8:853cec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cec00 r8:80287e08 r7:eadf1e60 r6:853cec80 r5:84b09800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf881fb0 to 0xdf881ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:853d2c40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bc67b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:490:4472 blocked for more than 460 seconds. r5:8542d400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85393b8c r4:85393800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853ced00 r8:80287e08 r7:df881e60 r6:853d6380 r5:8542d400 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8542ec00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85399f8c r4:85399c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bcde8000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:4475 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:4475 tgid:4475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:853f5400 r4:853f5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85393f8c r4:85393c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853cee00 r8:80287e08 r7:eaf71e60 r6:853d6480 r5:853f5400 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cdf00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85430c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539838c r4:85398000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539838c r4:853cee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85430c00 r8:853ceeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cee80 r8:80287e08 r7:eaf71e60 r6:853d6500 r5:85430c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d4140 INFO: task kworker/0:493:4477 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bd5a0000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:494:4479 blocked for more than 460 seconds. r4:85432400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eb100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85432400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539878c r4:85398400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539878c r4:853cef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85432400 r8:853cef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cef00 r8:80287e08 r7:eaf71e60 r6:853d6580 r5:85432400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf85fb0 to 0xeaf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85398b8c r4:85398800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85398b8c r4:853cef80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85431800 r8:853cefac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cef80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cef80 r8:80287e08 r7:eaf71e60 r6:853d6600 r5:85431800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853eb040 INFO: task kworker/0:495:4481 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bda47000 e0047000 00000001 80239b98 7f07d000 00000001 9d60: 80230ad0 80239bb0 80000013 ffffffff r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85433c00 r8:830cc32c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8539938c r4:85399000 r7:dddced80 r6:83018000 r5:8539938c r4:830cc280 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539978c r4:85399400 r4:83348880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83348880 r8:80287e08 r7:eaf71e60 r6:853d6780 r5:85433000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853eb580 INFO: task kworker/0:498:4487 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: be3b1000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:499:4489 blocked for more than 460 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eb7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85434800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85399b8c r4:85399800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85399b8c r4:83348800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85434800 r8:8334882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83348800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83348800 r8:80287e08 r7:eaf71e60 r6:853d6800 r5:85434800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853eb3c0 INFO: task kworker/0:499:4489 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) r4:8506bc80 task:kworker/0:500 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eba40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539a38c r4:8539a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539a38c r4:8546b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:8546b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546b000 r8:80287e08 r7:eaf71e60 r6:8546b080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf61fb0 to 0xeaf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853eb5c0 INFO: task kworker/0:500:4491 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: be7c5000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05d9fb0 to 0xe05d9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84b0b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r5:8539ab8c r4:8539a800 r10:61c88647 r9:84b0b000 r8:8546b12c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4496 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df8e5d84 r8:00000002 r7:60000013 r6:df8e5d8c r5:84b0a400 r4:84b0a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df8e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ebc40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539a78c r4:8539a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539a78c r4:8546b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0a400 r8:8546b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546b200 r8:80287e08 r7:eafb5e60 r6:8546b280 r5:84b0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e5fb0 to 0xdf8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853eb980 INFO: task kworker/0:502:4496 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: be8de000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8597c38c r4:8597c000 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:504 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:85435400 r4:85435400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85435400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546f040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85435400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539b38c r4:8539b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539b38c r4:8546b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85435400 r8:8546b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546b400 r8:80287e08 r7:eafb9e60 r6:853d6880 r5:85435400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546f000 INFO: task kworker/0:504:4500 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: beffd000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:85436000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539b78c r4:8539b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539b78c r4:8546b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85436000 r8:8546b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546b480 r8:80287e08 r7:eafcde60 r6:853d6900 r5:85436000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546f200 INFO: task kworker/0:505:4502 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bf444000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:4504 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4504 tgid:4504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:85438000 r4:85438000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dcd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfba3000 r5:8539c38c r4:8539c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539c38c r4:8546b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438000 r8:8546b52c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8546b500 r8:80287e08 r7:eafdde60 r6:853d6980 r5:85438000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546f140 INFO: task kworker/0:506:4504 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bf787000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:4505 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:85438c00 r4:85438c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546f4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85438c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539bb8c r4:8539b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bb8c r4:8546b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438c00 r8:8546b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8546f140 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bf787000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:4508 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb005d84 r8:00000002 r7:60000013 r6:eb005d8c r5:85439800 r4:85439800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85439800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546f5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85439800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539bf8c r4:8539bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bf8c r4:8546b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85439800 r8:8546b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546b600 r8:80287e08 r7:eafe5e60 r6:853d6a80 r5:85439800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05d9dc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4510 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4510 tgid:4510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb015d84 r8:00000002 r7:60000013 r6:eb015d8c r5:8543bc00 r4:8543bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dcf40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539cf8c r4:8539cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539cf8c r4:8546b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543bc00 r8:8546b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546b680 r8:80287e08 r7:eafe5e60 r6:853d6b00 r5:8543bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8543a400 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85316b8c r4:85316800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: bfe82000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:4515 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:8543c800 r4:8543c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531678c r4:85316400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531678c r4:853d6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543c800 r8:853d6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d6c80 r8:80287e08 r7:eb011e60 r6:853d6d00 r5:8543c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb1fb0 to 0xeafb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8531738c r4:85317000 r4:853d6d80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:510:4519 blocked for more than 461 seconds. r5:8543ec00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539c78c r4:8539c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539c78c r4:8546b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543ec00 r8:8546b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546b700 r8:80287e08 r7:eb015e60 r6:853d6e80 r5:8543ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546f740 INFO: task kworker/0:510:4519 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c01bc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:4520 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae59d84 r8:00000002 r7:60000113 r6:eae59d8c r5:8543b000 r4:8543b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543b000 r4:8291a680 r4:00000000 r9:83018205 r8:8543b000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r5:85316f8c r4:85316c00 r10:61c88647 r9:8543b000 r8:853d6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: c058b000 e0047000 00000001 80239b98 7f07d000 00000001 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:4522 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:8543e000 r4:8543e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e882b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a72f8c r4:84a72c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a72f8c r4:85472000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543e000 r8:8547202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472000 r8:80287e08 r7:eaca9e60 r6:85472080 r5:8543e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85475c00 INFO: task kworker/1:188:4522 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c058b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:4525 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaee1d84 r8:00000002 r7:60000013 r6:eaee1d8c r5:85436c00 r4:85436c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85436c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ebf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531778c r4:85317400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531778c r4:85472100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85436c00 r8:8547212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472100 r8:80287e08 r7:eaf09e60 r6:85472180 r5:85436c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ebec0 INFO: task kworker/1:189:4525 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c058b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:4528 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:85440000 r4:85440000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85440000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84867e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85440000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85317b8c r4:85317800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85317b8c r4:85472200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85440000 r8:8547222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472200 r8:80287e08 r7:eaf09e60 r6:85472280 r5:85440000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb019fb0 to 0xeb019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471080 INFO: task kworker/1:190:4528 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c0c2c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:4529 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:85440c00 r4:85440c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85440c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85440c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85317f8c r4:85317c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85317f8c r4:85472300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85440c00 r8:8547232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472300 r8:80287e08 r7:eaf09e60 r6:85472380 r5:85440c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf1dfb0 to 0xeaf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471140 INFO: task kworker/1:191:4529 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c0da7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:192:4532 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb01dd84 r8:00000002 r7:60000013 r6:eb01dd8c r5:85441800 r4:85441800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85441800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854717c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85441800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533478c r4:85334400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533478c r4:85472400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85441800 r8:8547242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472400 r8:80287e08 r7:eaf09e60 r6:85472480 r5:85441800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471200 INFO: task kworker/1:192:4532 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c0da7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:4533 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb025d84 r8:00000002 r7:60000013 r6:eb025d8c r5:85442400 r4:85442400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85442400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854714c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85442400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e885d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a72b8c r4:84a72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a72b8c r4:85472500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85442400 r8:8547252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472500 r8:80287e08 r7:eb01de60 r6:85472580 r5:85442400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471340 INFO: task kworker/1:193:4533 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c104f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:4535 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:4535 tgid:4535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb029d84 r8:00000002 r7:60000013 r6:eb029d8c r5:85443000 r4:85443000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85443000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85443000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e887d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533438c r4:85334000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533438c r4:85472600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85443000 r8:8547262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472600 r8:80287e08 r7:eb01de60 r6:85472680 r5:85443000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471700 INFO: task kworker/1:194:4535 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c104f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:4537 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:4537 tgid:4537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:85443c00 r4:85443c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85443c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85443c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85334b8c r4:85334800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85334b8c r4:85472700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85443c00 r8:8547272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472700 r8:80287e08 r7:eb01de60 r6:85472780 r5:85443c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854715c0 INFO: task kworker/1:195:4537 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c13f4000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:4540 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:85444800 r4:85444800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85444800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85444800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea911000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85334f8c r4:85334c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85334f8c r4:85472800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85444800 r8:8547282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472800 r8:80287e08 r7:eb02de60 r6:85472880 r5:85444800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471800 INFO: task kworker/1:196:4540 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c175d000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:4541 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:85445400 r4:85445400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85445400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85445400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533538c r4:85335000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533538c r4:85472900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85445400 r8:8547292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472900 r8:80287e08 r7:eb035e60 r6:85472980 r5:85445400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471940 INFO: task kworker/1:197:4541 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c19de000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:4544 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:85446000 r4:85446000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85446000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85446000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533578c r4:85335400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533578c r4:85472a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85446000 r8:85472a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472a00 r8:80287e08 r7:eb021e60 r6:85472a80 r5:85446000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471b00 INFO: task kworker/1:198:4544 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c1e38000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:4545 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:4545 tgid:4545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb03dd84 r8:00000002 r7:60000013 r6:eb03dd8c r5:85446c00 r4:85446c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85446c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85335f8c r4:85335c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85335f8c r4:85472b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85446c00 r8:85472b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472b00 r8:80287e08 r7:eb039e60 r6:85472b80 r5:85446c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471c40 INFO: task kworker/1:199:4545 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c1e38000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:4546 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb045d84 r8:00000002 r7:60000013 r6:eb045d8c r5:85448000 r4:85448000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85448000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85335b8c r4:85335800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85335b8c r4:85472c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85448000 r8:85472c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472c00 r8:80287e08 r7:eb03de60 r6:85472c80 r5:85448000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85471c40 INFO: task kworker/1:200:4546 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c254c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:201:4549 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:201 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:85449800 r4:85449800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85449800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85449800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533638c r4:85336000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533638c r4:85472d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85449800 r8:85472d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472d00 r8:80287e08 r7:eb03de60 r6:85472d80 r5:85449800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e8100 INFO: task kworker/1:201:4549 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c2a02000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:4550 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:8544a400 r4:8544a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533678c r4:85336400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533678c r4:85472e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544a400 r8:85472e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472e00 r8:80287e08 r7:eb049e60 r6:85472e80 r5:8544a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e8100 INFO: task kworker/1:202:4550 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c2a02000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:4553 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:85448c00 r4:85448c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85448c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85336b8c r4:85336800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85336b8c r4:85472f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85448c00 r8:85472f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85472f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472f00 r8:80287e08 r7:eb04de60 r6:85472f80 r5:85448c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e8380 INFO: task kworker/1:203:4553 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c2d35000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:4555 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:8544bc00 r4:8544bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8544bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85336f8c r4:85336c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85336f8c r4:853e2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544bc00 r8:853e202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2000 r8:80287e08 r7:eb041e60 r6:853e2080 r5:8544bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e8400 INFO: task kworker/1:204:4555 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c3051000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 INFO: task kworker/1:205:4558 blocked for more than 461 seconds. r10:8291a684 r9:eb061d84 r8:00000002 r7:60000013 r6:eb061d8c r5:84b0c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8533738c r4:85337000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853e2100 r8:80287e08 r7:eb051e60 r6:8546b780 r5:84b0c800 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:8533778c r4:85337400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c3260000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:4560 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb069d84 r8:00000002 r7:60000013 r6:eb069d8c r5:84b0e000 r4:84b0e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85337b8c r4:85337800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85337b8c r4:853e2180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0e000 r8:853e21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2180 r8:80287e08 r7:eb065e60 r6:8546b880 r5:84b0e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e89c0 INFO: task kworker/1:207:4560 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c3583000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb06dd84 r8:00000002 r7:60000013 r6:eb06dd8c r5:84b0bc00 r4:84b0bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e8dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85337f8c r4:85337c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85337f8c r4:853e2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0bc00 r8:853e22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb071d84 r8:00000002 r7:60000013 r6:eb071d8c r5:8542e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546ffc0 r5:854a8b8c r4:854a8800 r7:ddde2d80 r6:83018200 r5:854a8b8c r4:853e2300 r10:61c88647 r9:8542e000 r8:853e232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2300 r8:80287e08 r7:eb06de60 r6:8546b980 r5:8542e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e8c40 INFO: task kworker/1:209:4564 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c379e000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:210:4567 blocked for more than 461 seconds. r10:8291a684 r9:eb05dd84 r8:00000002 r7:60000013 r6:eb05dd8c r5:8544c800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854a838c r4:854a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539cb8c r4:8539c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:853dc200 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c3e26000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:4570 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb091d84 r8:00000002 r7:60000113 r6:eb091d8c r5:85299800 r4:85299800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85299800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e80c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85299800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a878c r4:854a8400 r7:ddde2d80 r6:83018200 r5:854a878c r4:853e2480 r10:00000000 r9:853e2480 r8:80287e08 r7:eb071e60 r6:8546bb00 r5:85299800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e8fc0 INFO: task kworker/1:211:4570 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c4122000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:4573 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb0a7000 r5:854a8f8c r4:854a8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a8f8c r4:853e2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e8000 r8:853e252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8546fe80 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:4574 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b1d84 r8:00000002 r7:60000013 r6:eb0b1d8c r5:848e9800 r4:848e9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a938c r4:854a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a938c r4:853e2580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e9800 r8:853e25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2580 r8:80287e08 r7:eb0a5e60 r6:8546bc00 r5:848e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:4577 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c1d84 r8:00000002 r7:60000113 r6:eb0c1d8c r5:848eb000 r4:848eb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848eb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a978c r4:854a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a978c r4:853e2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848eb000 r8:853e262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2600 r8:80287e08 r7:eb0b1e60 r6:8546bc80 r5:848eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db1c0 INFO: task kworker/1:214:4577 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c45d0000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:8506bc80 INFO: task kworker/1:215:4578 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c5d84 r8:00000002 r7:60000113 r6:eb0c5d8c r5:848ebc00 r4:848ebc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ebc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a9b8c r4:854a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a9b8c r4:853e2680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ebc00 r8:853e26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2680 r8:80287e08 r7:eb0c1e60 r6:8546bd00 r5:848ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db1c0 INFO: task kworker/1:215:4578 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c4bff000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:4583 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:4583 tgid:4583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:848ec800 r4:848ec800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ec800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ab78c r4:854ab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ab78c r4:853e2700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ec800 r8:853e272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2700 r8:80287e08 r7:eb0c5e60 r6:8546bd80 r5:848ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db3c0 INFO: task kworker/1:216:4583 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c4c62000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:4584 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf29d84 r8:00000002 r7:60000013 r6:eaf29d8c r5:848ed400 r4:848ed400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ed400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dca00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539d38c r4:8539d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539d38c r4:8546be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ed400 r8:8546be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546be00 r8:80287e08 r7:eb015e60 r6:8546be80 r5:848ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dcec0 INFO: task kworker/0:512:4584 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c4f9d000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:4586 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:848ea400 r4:848ea400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ea400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a9f8c r4:854a9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a9f8c r4:853e2780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ea400 r8:853e27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4587 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae11d84 r8:00000002 r7:60000113 r6:eae11d8c r5:848eec00 r4:848eec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848eec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cc280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539d78c r4:8539d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539d78c r4:8546bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848eec00 r8:8546bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546bf80 r8:80287e08 r7:eaf29e60 r6:853ca000 r5:848eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:848e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 r5:8539db8c r4:8539d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539db8c r4:853ca080 r10:61c88647 r9:848e8c00 r8:853ca0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: c5397000 e0047000 00000001 80239b98 7f07d000 00000001 r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4591 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4591 tgid:4591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:83252400 r4:83252400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83252400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ccac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539df8c r4:8539dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539df8c r4:853ca180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:853ca1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ca180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ca180 r8:80287e08 r7:eaf6de60 r6:853ca200 r5:83252400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cc100 INFO: task kworker/0:515:4591 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c5a18000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:4592 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafbdd84 r8:00000002 r7:60000113 r6:eafbdd8c r5:85410c00 r4:85410c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85410c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85410c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0689000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aa38c r4:854aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854aa38c r4:853e2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410c00 r8:853e282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2800 r8:80287e08 r7:eae51e60 r6:853ca280 r5:85410c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db580 INFO: task kworker/1:218:4592 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c5a18000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:4595 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:85412400 r4:85412400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85412400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85412400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aa78c r4:854aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854aa78c r4:853e2880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85412400 r8:853e28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2880 r8:80287e08 r7:eae51e60 r6:853ca300 r5:85412400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd1fb0 to 0xeafd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db6c0 INFO: task kworker/1:219:4595 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c5b80000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:4597 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:4597 tgid:4597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:85411800 r4:85411800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85411800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dbf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85411800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aab8c r4:854aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854aab8c r4:853e2900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85411800 r8:853e292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2900 r8:80287e08 r7:eae51e60 r6:853ca380 r5:85411800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe1fb0 to 0xeafe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539e38c r4:8539e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 r4:e05d9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05d9fb0 to 0xe05d9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85413c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539e78c r4:8539e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539e78c r4:853ca500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85413c00 r8:853ca52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ca500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ca500 r8:80287e08 r7:eafd9e60 r6:853ca580 r5:85413c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853cca80 INFO: task kworker/0:517:4602 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c626c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:518:4604 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cc3c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539ef8c r4:853ca600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85414800 r8:853ca62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ca600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ca600 r8:80287e08 r7:eb059e60 r6:853ca680 r5:85414800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ccc40 INFO: task kworker/0:518:4604 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c626c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 INFO: task kworker/0:519:4606 blocked for more than 461 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: c66ed000 e0047000 00000001 80239b98 7f07d000 00000001 r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:4608 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:85416c00 r4:85416c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c2600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85416c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539ff8c r4:8539fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539ff8c r4:853ca800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85416c00 r8:853ca82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ca800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ca800 r8:80287e08 r7:eafede60 r6:853ca880 r5:85416c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ccf80 INFO: task kworker/0:520:4608 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dc5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85416000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539f38c r4:8539f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539f38c r4:853ca900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85416000 r8:853ca92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ca900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ca900 r8:80287e08 r7:eb0a1e60 r6:853ca980 r5:85416000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dcd80 INFO: task kworker/0:521:4610 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c6977000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab4f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848ee000 r8:853caa2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:4614 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0ddd84 r8:00000002 r7:60000013 r6:eb0ddd8c r5:84ba9800 r4:84ba9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c2400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ba9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab83000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb0cb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ba8c00 r8:853cac2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c2200 INFO: task kworker/0:524:4616 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c706f000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Not tainted 6.15.0-rc7-syzkaller #0 r5:84bab000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c2700 INFO: task kworker/0:525:4619 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c72a4000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:526:4620 blocked for more than 462 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8544d400 r8:853cae2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c749b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000013 r6:eb00dd8c r5:8544b000 r4:8544b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c2e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8544b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf43000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b138c r4:853b1000 r7:dddced80 r6:83018000 r5:853b138c r4:853cae80 r10:00000000 r9:853cae80 r8:80287e08 r7:eb0e9e60 r6:853e2a00 r5:8544b000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:4623 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:8544e000 r4:8544e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8544e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb055000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ab38c r4:854ab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ab38c r4:853e2a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544e000 r8:853e2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e2a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2a80 r8:80287e08 r7:eae51e60 r6:853e2b00 r5:8544e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dbe00 INFO: task kworker/1:221:4623 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c7995000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:8506bc80 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8544ec00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c7e79000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4628 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb105d84 r8:00000002 r7:60000113 r6:eb105d8c r5:85451800 r4:85451800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85451800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c2f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85451800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b178c r4:853b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b178c r4:853caf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85451800 r8:853cafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853caf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:530:4630 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000013 r6:eb10dd8c r5:85450c00 r4:85450c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85450c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c2a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b1b8c r4:853b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1b8c r4:853c6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85450c00 r8:853c602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6000 r8:80287e08 r7:eb105e60 r6:853e2c80 r5:85450c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c2e00 INFO: task kworker/0:530:4630 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c8177000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 task:kworker/0:531 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb111d84 r8:00000002 r7:60000013 r6:eb111d8c r5:85452400 r4:85452400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85452400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dbb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85452400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b1f8c r4:853b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1f8c r4:853c6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85452400 r8:853c60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6080 r8:80287e08 r7:eb10de60 r6:853e2d00 r5:85452400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb111fb0 to 0xeb111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c2e00 INFO: task kworker/0:531:4631 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c83cf000 e0047000 00000001 80239b98 7f07d000 00000001 r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4635 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb07dd84 r8:00000002 r7:60000013 r6:eb07dd8c r5:85453000 r4:85453000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85453000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85453000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b278c r4:853b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b278c r4:853c6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85453000 r8:853c61ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb07dfb0 to 0xeb07dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2b8c r4:853b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b2b8c r4:853c6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85454800 r8:853c622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6200 r8:80287e08 r7:eb07de60 r6:853e2e80 r5:85454800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1000 INFO: task kworker/0:534:4639 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c8bfc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e04a1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85455400 r8:853c62ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:82ac21e4 r4:e05d9dc0 r4:00000000 r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85453c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85453c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0619000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b338c r4:853b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b338c r4:853c6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85453c00 r8:853c632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6300 r8:80287e08 r7:eb08de60 r6:853e2f80 r5:85453c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1380 INFO: task kworker/0:536:4644 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c9020000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85458c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8879000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e038c r4:854e0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e038c r4:853c6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85458c00 r8:853c63ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6380 r8:80287e08 r7:eb0b9e60 r6:853e3000 r5:85458c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1380 INFO: task kworker/0:537:4646 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c9020000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:538 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r5:00001000 r4:e072d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85459800 r8:853c642c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4648 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:84babc00 r4:84babc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84babc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84babc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b3b8c r4:853b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3b8c r4:853c6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84babc00 r8:853c64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6480 r8:80287e08 r7:eb121e60 r6:853c6500 r5:84babc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb129d84 r8:00000002 r7:60000013 r6:eb129d8c r5:84bad400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e19c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bad400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e883f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b3f8c r4:853b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3f8c r4:853c6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bad400 r8:853c65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6580 r8:80287e08 r7:eb121e60 r6:853c6600 r5:84bad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1700 INFO: task kworker/0:540:4651 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: c9808000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:4653 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb12dd84 r8:00000002 r7:60000013 r6:eb12dd8c r5:84bae000 r4:84bae000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bae000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1c40 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e078c r4:854e0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e078c r4:853c6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:853c6680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4655 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:84baec00 r4:84baec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84baec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e0b8c r4:854e0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1f40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e0f8c r4:854e0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e0f8c r4:853c6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bac800 r8:853c68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6880 r8:80287e08 r7:eb131e60 r6:853c6900 r5:84bac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1bc0 INFO: task kworker/0:543:4658 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ca151000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:e05d9dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:4659 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb139d84 r8:00000002 r7:60000113 r6:eb139d8c r5:84baa400 r4:84baa400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4662 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb13dd84 r8:00000002 r7:60000013 r6:eb13dd8c r5:84ba8000 r4:84ba8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ba8000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e1f8c r4:854e1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e1f8c r4:853c6a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8000 r8:853c6aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6a80 r8:80287e08 r7:eb139e60 r6:853c6b00 r5:84ba8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854621c0 INFO: task kworker/0:545:4662 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:546:4663 blocked for more than 462 seconds. r4:85410000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85462100 INFO: task kworker/0:546:4663 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ca75b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:4664 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:4664 tgid:4664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:85420000 r4:85420000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85420000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85420000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e1b8c r4:854e1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e1b8c r4:853c6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85420000 r8:853c6cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6c80 r8:80287e08 r7:eb13de60 r6:853c6d00 r5:85420000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85462100 INFO: task kworker/0:547:4664 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8545b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e238c r4:854e2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e238c r4:853c6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545b000 r8:853c6dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6d80 r8:80287e08 r7:eb13de60 r6:853e3100 r5:8545b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85462440 INFO: task kworker/0:548:4667 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ca75b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:8545c800 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8545c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e2b8c r4:854e2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e2b8c r4:853c6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545c800 r8:853c6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6e80 r8:80287e08 r7:eb151e60 r6:853e3180 r5:8545c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854624c0 Call trace: 9d20: ca9bd000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: caf55000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4672 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:8545e000 r4:8545e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8545e000 r8:853c6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eb16dd84 r8:00000002 r7:60000013 r6:eb16dd8c r5:8545d400 r4:8545d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8545d400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e3b8c r4:854e3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e3b8c r4:853c6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545d400 r8:853c6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6f80 r8:80287e08 r7:eb165e60 r6:853e3300 r5:8545d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85462800 INFO: task kworker/0:552:4674 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cb498000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafd5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85423000 r8:8547712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85462c40 INFO: task kworker/0:554:4678 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cb84c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4681 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb009000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:85424800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85424800 r8:8547732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d7700 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:4685 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:85425400 r4:85425400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85425400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85425400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ec38c r4:854ec000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ec38c r4:85477400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85425400 r8:8547742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85477400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477400 r8:80287e08 r7:eb179e60 r6:85477480 r5:85425400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1fc0 INFO: task kworker/0:557:4685 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cbe09000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:853e3380 r8:80287e08 r7:eae51e60 r6:853e3400 r5:8545ec00 r4:8547e340 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r4:00000000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:558:4690 blocked for more than 463 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ed38c r4:854ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ed38c r4:85477500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545a400 r8:8547752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85477500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477500 r8:80287e08 r7:eb179e60 r6:853e3480 r5:8545a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85478280 INFO: task kworker/0:558:4690 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cc2c7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:4691 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb199d84 r8:00000002 r7:60000013 r6:eb199d8c r5:8545bc00 r4:8545bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478980 r9:83018005 r8:8545bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:854ecf8c r4:854ecc00 r7:dddced80 r6:83018000 r5:854ecf8c r4:85477580 r10:00000000 r9:85477580 r8:80287e08 r7:eb195e60 r6:853e3500 r5:8545bc00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:4693 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:85456c00 r4:85456c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85456c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85456c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854abb8c r4:854ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854abb8c r4:853e3580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85456c00 r8:853e35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3580 r8:80287e08 r7:eb145e60 r6:853e3600 r5:85456c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547e880 INFO: task kworker/1:223:4693 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85456000 r5:85456000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547eb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85456000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854abf8c r4:854abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854abf8c r4:853e3680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85456000 r8:853e36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3680 r8:80287e08 r7:eb185e60 r6:853e3700 r5:85456000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547e7c0 INFO: task kworker/1:224:4695 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:4697 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84b98000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r5:854bdf8c r4:854bdc00 r7:ddde2d80 r6:83018200 r5:854bdf8c r4:853e3780 r10:00000000 r9:853e3780 r8:80287e08 r7:eb1ade60 r6:853e3800 r5:84b98000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547e980 INFO: task kworker/1:225:4697 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ccd52000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) r4:8506bc80 INFO: task kworker/0:560:4700 blocked for more than 463 seconds. Call trace: r4:84b98c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb1e5000 r5:854edb8c r4:854ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854edb8c r4:85477680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b98c00 r8:854776ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85477680 r8:80287e08 r7:eb195e60 r6:853e3880 r5:84b98c00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cd0f7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:4701 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d1d84 r8:00000002 r7:60000113 r6:eb1d1d8c r5:84b99800 r4:84b99800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b99800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ef40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b99800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r5:84a7338c r4:84a73000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b99800 r8:853e392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:561:4702 blocked for more than 463 seconds. r4:84b9a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854ed78c r4:854ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ed78c r4:85477700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9a400 r8:8547772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85477700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477700 r8:80287e08 r7:eb1cde60 r6:853e3a00 r5:84b9a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85478b40 INFO: task kworker/0:561:4702 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cd0f7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854bc78c r4:854bc400 r7:ddde2d80 r6:83018200 r5:854bc78c r4:853e3a80 r4:853e3a80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84b9bc00 r4:00000000 r4:00000000 r5:854edf8c r4:854edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85477780 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cd4de000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:4709 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb209d84 r8:00000002 r7:60000013 r6:eb209d8c r5:84b9c800 r4:84b9c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r5:00001000 r4:eb1fd000 r5:854ee38c r4:854ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85477800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:564:4711 blocked for more than 463 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb215000 r5:854bc38c r4:854bc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:4713 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:4713 tgid:4713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb219d84 r8:00000002 r7:60000113 r6:eb219d8c r5:85422400 r4:85422400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85422400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85422400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ee78c r4:854ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ee78c r4:85477900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85422400 r8:8547792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85477900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477900 r8:80287e08 r7:eb20de60 r6:85477980 r5:85422400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb229000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854eeb8c r4:854ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854eeb8c r4:85477a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85420c00 r8:85477a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85477a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477a00 r8:80287e08 r7:eb20de60 r6:85477a80 r5:85420c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546d000 INFO: task kworker/0:566:4715 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ce0dc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85521800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 r5:854eef8c r4:854eec00 r10:61c88647 r9:85521800 r8:85477b2c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:4719 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:4719 tgid:4719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:85520000 r4:85520000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85520000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546d680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85520000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 r5:854ef38c r4:854ef000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ef38c r4:85477c00 r10:61c88647 r9:85520000 r8:85477c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8546d000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:569:4721 blocked for more than 463 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85520c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 r5:854bcb8c r4:854bc800 r10:61c88647 r9:85520c00 r8:85477d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:4723 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:4723 tgid:4723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb281d84 r8:00000002 r7:60000113 r6:eb281d8c r5:85523c00 r4:85523c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85523c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546d940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85523c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ef78c r4:854ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ef78c r4:85477e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85523c00 r8:85477e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85477e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477e00 r8:80287e08 r7:eb25de60 r6:85477e80 r5:85523c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb281fb0 to 0xeb281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546d880 INFO: task kworker/0:570:4723 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:571:4726 blocked for more than 463 seconds. r4:85522400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85522400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546df80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85522400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854efb8c r4:854ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854efb8c r4:85477f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85522400 r8:85477f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85477f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477f00 r8:80287e08 r7:eb25de60 r6:85477f80 r5:85522400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb299fb0 to 0xeb299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546da40 INFO: task kworker/0:571:4726 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:8597c38c r4:8597c000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:228:4728 blocked for more than 463 seconds. r5:85524800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854bd38c r4:854bd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853e3d00 r8:80287e08 r7:eb17de60 r6:85477600 r5:85524800 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:572:4731 blocked for more than 463 seconds. r5:85523000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854eff8c r4:854efc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854eff8c r4:853ef000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85523000 r8:853ef02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef000 r8:80287e08 r7:eb299e60 r6:853ef080 r5:85523000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546dec0 INFO: task kworker/0:572:4731 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cf14b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:4733 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:4733 tgid:4733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:85526c00 r4:85526c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85526c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:854f038c r4:854f0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) r4:8546dec0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85526000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 r5:854f138c r4:854f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f138c r4:853ef200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85526000 r8:853ef22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef200 r8:80287e08 r7:eb2b1e60 r6:853ef280 r5:85526000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e0080 INFO: task kworker/0:574:4735 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cf733000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:575:4736 blocked for more than 463 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0525000 r5:854f078c r4:854f0400 r7:dddced80 r6:83018000 r5:854f078c r4:853ef300 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:229:4737 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:229 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:84b9ec00 r4:84b9ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85466700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e003b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bd78c r4:854bd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bd78c r4:853e3e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9ec00 r8:853e3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3e00 r8:80287e08 r7:eb17de60 r6:853e3e80 r5:84b9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85466640 INFO: task kworker/1:229:4737 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: cfac2000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:230:4739 blocked for more than 463 seconds. r5:85550000 r4:8291a680 r4:00000000 r4:00000000 r5:854bdb8c r4:854bd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85550000 r8:853e3f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:4741 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:85550c00 r4:85550c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85550c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85550c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0673000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f0b8c r4:854f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f0b8c r4:853ef380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85550c00 r8:853ef3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef380 r8:80287e08 r7:eb2b5e60 r6:853ea000 r5:85550c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/1:231:4745 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b9d84 r8:00000002 r7:60000113 r6:eb2b9d8c r5:85551800 r4:85551800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85551800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85551800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854beb8c r4:854be800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854beb8c r4:853ea080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85551800 r8:853ea0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ea080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea080 r8:80287e08 r7:eb17de60 r6:853ea100 r5:85551800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85466980 INFO: task kworker/1:231:4745 is blocked on a mutex likely owned by task kworker/0:208:3739. r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:4746 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:85552400 r4:85552400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85552400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:854f178c r4:854f1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:4748 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c9d84 r8:00000002 r7:60000013 r6:eb2c9d8c r5:85553c00 r4:85553c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85553c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85466b40 r5:854f0f8c r4:854f0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 task:kworker/1:233 state:D stack:0 pid:4749 tgid:4749 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854be38c r4:854be000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853ea300 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 task:kworker/0:578 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:85555400 r4:85555400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85555400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85555400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f1b8c r4:854f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f1b8c r4:853ef480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85555400 r8:853ef4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef480 r8:80287e08 r7:eb2c1e60 r6:853ea400 r5:85555400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e0bc0 INFO: task kworker/0:578:4752 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 r5:8597c38c r4:8597c000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:579:4754 blocked for more than 463 seconds. r4:85556c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r5:00001000 r4:eabbb000 r5:854f278c r4:854f2400 r7:dddced80 r6:83018000 r5:854f278c r4:853ef500 Exception stack(0xeb2ddfb0 to 0xeb2ddff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r4:e05d9dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85556000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85556000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f1f8c r4:854f1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f1f8c r4:853ef580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85556000 r8:853ef5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef580 r8:80287e08 r7:eb2dde60 r6:853ea500 r5:85556000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e0c40 INFO: task kworker/0:580:4755 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d11c8000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:4757 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:85553000 r4:85553000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85553000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85553000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f238c r4:854f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f238c r4:853ef600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85553000 r8:853ef62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef600 r8:80287e08 r7:eb2dde60 r6:853ea580 r5:85553000 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f2f8c r4:854f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f2f8c r4:853ef680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b90000 r8:853ef6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef680 r8:80287e08 r7:eb2dde60 r6:853ea600 r5:84b90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e0f00 INFO: task kworker/0:582:4760 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d15ad000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b90c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eade7000 r5:854f2b8c r4:854f2800 r7:dddced80 r6:83018000 r5:854f2b8c r4:853ef700 r10:00000000 r9:853ef700 r8:80287e08 r7:eb2e9e60 r6:853ea680 r5:84b90c00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 task:kworker/0:584 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84b91800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b91800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b91800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f338c r4:854f3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f338c r4:853ef780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b91800 r8:853ef7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef780 r8:80287e08 r7:eb2e9e60 r6:853ea700 r5:84b91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c1100 INFO: task kworker/0:584:4765 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d1a46000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84b93000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e47c0 r5:854bef8c r4:854bec00 r7:ddde2d80 r6:83018200 r5:854bef8c r4:853ea780 r4:853ea780 5fa0: 00000000 00000000 00000000 00000000 r4:853e4300 INFO: task kworker/1:234:4767 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d1cc5000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:4768 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f9d84 r8:00000002 r7:60000113 r6:eb2f9d8c r5:84b93c00 r4:84b93c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b93c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:854f838c r4:854f8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f838c r4:853ef800 r10:00000000 r9:853ef800 r8:80287e08 r7:eb2c5e60 r6:853ea880 r5:84b93c00 r4:853c11c0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854f378c r4:854f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853ef880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d1cc5000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:4771 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d5d84 r8:00000002 r7:60000013 r6:eb2d5d8c r5:85426c00 r4:85426c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85426c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85426c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f3b8c r4:854f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f3b8c r4:853ef900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85426c00 r8:853ef92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ef900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ef900 r8:80287e08 r7:eb2f9e60 r6:853ef980 r5:85426c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c1240 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:8597c38c r4:8597c000 r4:8506c780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854f3f8c r4:853efa00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d60: 80230ad0 80239bb0 80000013 ffffffff [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:4776 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:4776 tgid:4776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:85525400 r4:85525400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85525400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85525400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f8f8c r4:854f8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f8f8c r4:853efb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85525400 r8:853efb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853efb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853efb00 r8:80287e08 r7:eb2f9e60 r6:853efb80 r5:85525400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c1740 INFO: task kworker/0:589:4776 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d29f4000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b88000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f878c r4:854f8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f878c r4:853efc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b88000 r8:853efc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853efc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853efc00 r8:80287e08 r7:eb305e60 r6:853efc80 r5:84b88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c1880 INFO: task kworker/0:590:4778 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d29f4000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:591:4779 blocked for more than 464 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb311000 r5:854f8b8c r4:854f8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f978c r4:854f9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f978c r4:853efe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b89800 r8:853efe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853efe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853efe00 r8:80287e08 r7:eb305e60 r6:853efe80 r5:84b89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c1c40 INFO: task kworker/0:592:4781 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d2c81000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:854f938c r4:853eff00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:4785 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d1d84 r8:00000002 r7:60000113 r6:eb2d1d8c r5:84b8bc00 r4:84b8bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb349000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f9f8c r4:854f9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f9f8c r4:8547f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8bc00 r8:8547f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547f000 r8:80287e08 r7:eb321e60 r6:8547f080 r5:84b8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 r5:854f9b8c r4:854f9800 r7:dddced80 r6:83018000 r5:854f9b8c r4:8547f100 r10:00000000 r9:8547f100 r8:80287e08 r7:eb2d1e60 r6:8547f180 r5:84b8c800 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05d9dc0 r5:00001000 r4:eb0cb000 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:596 state:D stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb34dd84 r8:00000002 r7:60000013 r6:eb34dd8c r5:84b8d400 r4:84b8d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854faf8c r4:854fac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854faf8c r4:8547f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:8547f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547f200 r8:80287e08 r7:eb2d1e60 r6:8547f280 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547d1c0 INFO: task kworker/0:596:4790 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:84b8e000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fa38c r4:854fa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854fa38c r4:8547f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8e000 r8:8547f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547f300 r8:80287e08 r7:eb34de60 r6:8547f380 r5:84b8e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547d080 INFO: task kworker/0:597:4793 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d3d97000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854fa78c r4:854fa400 r7:dddced80 r6:83018000 r5:854fa78c r4:8547f400 r4:8547f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547f400 r8:80287e08 r7:eb34de60 r6:8547f480 r5:84b8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547d2c0 INFO: task kworker/0:598:4794 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d3d97000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:4796 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854fab8c r4:854fa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b8b000 r8:8547f52c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854fb78c r4:854fb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8547f600 r8:80287e08 r7:eb34de60 r6:8547f680 r5:85538c00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:4800 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb395d84 r8:00000002 r7:60000113 r6:eb395d8c r5:85538000 r4:85538000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85538000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547da00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85538000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb385000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fb38c r4:854fb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854fb38c r4:8547f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85538000 r8:8547f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547f700 r8:80287e08 r7:eb389e60 r6:8547f780 r5:85538000 Exception stack(0xeb395fb0 to 0xeb395ff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:8553a400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r9:83018005 r8:8553a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb09dfb0 to 0xeb09dff8) Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:8553bc00 r4:8553bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546e200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fbb8c r4:854fb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854fbb8c r4:8547f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553bc00 r8:8547f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547f900 r8:80287e08 r7:eb09de60 r6:8547f980 r5:8553bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547ddc0 INFO: task kworker/0:603:4805 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d4904000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854bf38c r4:854bf000 r10:61c88647 r9:85539800 r8:853ea9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb3adfb0 to 0xeb3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e4880 INFO: task kworker/1:235:4808 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d4cbb000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854bff8c r4:854bfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853eaa00 r8:80287e08 r7:eb3ade60 r6:8547fa80 r5:8553c800 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bfb8c r4:854bf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bfb8c r4:853eaa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b96c00 r8:853eaaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853eaa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eaa80 r8:80287e08 r7:eb3b1e60 r6:853eab00 r5:84b96c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e4880 INFO: task kworker/1:237:4810 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d4f5d000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:84b94800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854fbf8c r4:854fbc00 r7:dddced80 r6:83018000 r5:854fbf8c r4:8547fb00 r10:00000000 r9:8547fb00 r8:80287e08 r7:eb09de60 r6:853eab80 r5:84b94800 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:605:4815 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000013 r6:eb3c1d8c r5:84b96000 r4:84b96000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b96000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546ec80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b96000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85505b8c r4:85505800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85505b8c r4:8547fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b96000 r8:8547fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547fb80 r8:80287e08 r7:eb09de60 r6:853eac00 r5:84b96000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546e280 INFO: task kworker/0:605:4815 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d5505000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546e700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85559800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85504b8c r4:85504800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85504b8c r4:8547fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85559800 r8:8547fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547fc80 r8:80287e08 r7:eb3c1e60 r6:853ead00 r5:85559800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546e400 INFO: task kworker/0:607:4818 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d55fd000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:4820 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8553d400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546e840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85504f8c r4:85504c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85504f8c r4:8547fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553d400 r8:8547fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547fd00 r8:80287e08 r7:eb3c1e60 r6:8547fd80 r5:8553d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546e500 INFO: task kworker/0:608:4820 is blocked on a mutex likely owned by task kworker/0:208:3739. Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:609:4823 blocked for more than 464 seconds. r5:8553e000 r4:8291a680 r4:00000000 r4:00000000 r5:8550538c r4:85505000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8547fe00 Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:4825 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:8553ec00 r4:8553ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546eb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550578c r4:85505400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550578c r4:8547ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553ec00 r8:8547ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547ff00 r8:80287e08 r7:eb3c1e60 r6:8547ff80 r5:8553ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546ea40 INFO: task kworker/0:610:4825 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:611 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550638c r4:85506000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550638c r4:85491000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553b000 r8:8549102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491000 r8:80287e08 r7:eb3c1e60 r6:85491080 r5:8553b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8546ea80 INFO: task kworker/0:611:4827 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d5f9a000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:4828 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85505f8c r4:85505c00 r10:61c88647 r9:85540000 r8:8549112c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8550c78c r4:8550c400 r10:61c88647 r9:8555b000 r8:854911ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d6079000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:4832 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f5d84 r8:00000002 r7:60000113 r6:eb3f5d8c r5:85558c00 r4:85558c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85558c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456a180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85558c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 r5:8550678c r4:85506400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85558c00 r8:8549122c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: d6383000 e0047000 00000001 80239b98 7f07d000 00000001 r4:00000000 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r5:8555a400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85506b8c r4:85506800 r7:dddced80 r6:83018000 r5:85506b8c r4:85491280 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r5:8555d400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb007000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85506f8c r4:85506c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85506f8c r4:85491300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555d400 r8:8549132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491300 r8:80287e08 r7:eb3f1e60 r6:853eaf80 r5:8555d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e4880 INFO: task kworker/0:616:4836 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d6945000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:4838 blocked for more than 464 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:85540c00 r4:85540c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85540c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85540c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550738c r4:85507000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550738c r4:85491380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85540c00 r8:854913ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491380 r8:80287e08 r7:eb3f1e60 r6:85491400 r5:85540c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549b1c0 INFO: task kworker/0:617:4838 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d6dcb000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85541800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8550778c r4:85507400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb409fb0 to 0xeb409ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:4843 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb425d84 r8:00000002 r7:60000113 r6:eb425d8c r5:85542400 r4:85542400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85542400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85542400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85507f8c r4:85507c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85507f8c r4:85491600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85542400 r8:8549162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491600 r8:80287e08 r7:eb3f1e60 r6:85491680 r5:85542400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r5:85543000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85543000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb107000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550c38c r4:8550c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550c38c r4:85491700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85543000 r8:8549172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491700 r8:80287e08 r7:eb3f1e60 r6:85491780 r5:85543000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549b640 INFO: task kworker/0:620:4846 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d6dcb000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550df8c r4:8550dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d710c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:622:4848 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:622 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb399d84 r8:00000002 r7:60000013 r6:eb399d8c r5:85544800 r4:85544800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85544800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8550cb8c r4:8550c800 r7:dddced80 r6:83018000 r5:8550cb8c r4:85491900 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:623:4851 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:623 state:D stack:0 pid:4851 tgid:4851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb431d84 r8:00000002 r7:60000013 r6:eb431d8c r5:85545400 r4:85545400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85545400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549bc80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85545400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb187000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550cf8c r4:8550cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550cf8c r4:85491a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85545400 r8:85491a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491a00 r8:80287e08 r7:eb42de60 r6:85491a80 r5:85545400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549bb00 INFO: task kworker/0:623:4851 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d7503000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85546000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:8550d38c r4:8550d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85491b00 r8:80287e08 r7:eb42de60 r6:85491b80 r5:85546000 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:4855 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:625 state:D stack:0 pid:4855 tgid:4855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:85546c00 r4:85546c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85546c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549bf00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85546c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550d78c r4:8550d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550d78c r4:85491c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85546c00 r8:85491c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491c00 r8:80287e08 r7:eb42de60 r6:85491c80 r5:85546c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:626:4858 blocked for more than 464 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r5:00001000 r4:eb1b3000 r5:8550db8c r4:8550d800 r10:61c88647 r9:84b80000 r8:85491d2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:4859 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb445d84 r8:00000002 r7:60000013 r6:eb445d8c r5:84b80c00 r4:84b80c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b80c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855994c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b80c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550e38c r4:8550e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550e38c r4:85491e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b80c00 r8:85491e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491e00 r8:80287e08 r7:eb42de60 r6:85491e80 r5:84b80c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85599380 INFO: task kworker/0:627:4859 is blocked on a mutex likely owned by task kworker/0:208:3739. r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8550ef8c r4:8550ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r5:84b82400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8550e78c r4:8550e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85599380 INFO: task kworker/0:629:4864 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d8499000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:630:4865 blocked for more than 464 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8550eb8c r4:8550e800 r10:61c88647 r9:84b83000 r8:855a212c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:4868 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:4868 tgid:4868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb455d84 r8:00000002 r7:60000113 r6:eb455d8c r5:84b83c00 r4:84b83c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b83c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85599a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb213000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550f38c r4:8550f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550f38c r4:855a2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b83c00 r8:855a222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2200 r8:80287e08 r7:eb449e60 r6:855a2280 r5:84b83c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85599780 INFO: task kworker/0:631:4868 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d88da000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:632:4869 blocked for more than 464 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85599c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b84800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550f78c r4:8550f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550f78c r4:855a2300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b84800 r8:855a232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2300 r8:80287e08 r7:eb455e60 r6:855a2380 r5:84b84800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:4871 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:4871 tgid:4871 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b86000 r8:855a242c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:633:4871 is blocked on a mutex likely owned by task kworker/0:208:3739. 9d20: d8df7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb38de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85599e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550fb8c r4:8550f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8550fb8c r4:855a2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555ec00 r8:855a252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2500 r8:80287e08 r7:eb441e60 r6:855b1000 r5:8555ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 task:kworker/0:635 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:636:4877 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:84b95400 r4:84b95400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b95400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b2440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b95400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c938c r4:855c9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855c938c r4:855a2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b95400 r8:855a262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2600 r8:80287e08 r7:eb441e60 r6:855b1100 r5:84b95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548c200 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05d9dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:637 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855c878c r4:855c8400 r10:00000000 r9:855a2680 r8:80287e08 r7:eb469e60 r6:855b1180 r5:8555bc00 task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:638:4880 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85560c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 task:kworker/0:639 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:855c8f8c r4:855a2780 r10:00000000 r9:855a2780 r8:80287e08 r7:eb469e60 r6:855b1280 r5:85560000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c978c r4:855c9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855c978c r4:855a2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85561800 r8:855a282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2800 r8:80287e08 r7:eb469e60 r6:855b1300 r5:85561800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855b21c0 INFO: task kworker/0:640:4885 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: d9fed000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:4887 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:85562400 r4:85562400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85562400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855cab8c r4:855ca800 r4:855a2880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855a2900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:4890 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:85563c00 r4:85563c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85563c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b2780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85563c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c9f8c r4:855c9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855c9f8c r4:855a2980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85563c00 r8:855a29ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2980 r8:80287e08 r7:eb491e60 r6:855b1480 r5:85563c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 r4:00000000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:644 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855ca38c r4:855ca000 r4:855a2a00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:82ac21e4 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85566c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85566c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b2ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85566c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ca78c r4:855ca400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ca78c r4:855a2a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85566c00 r8:855a2aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2a80 r8:80287e08 r7:eb491e60 r6:855b1580 r5:85566c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855b2740 INFO: task kworker/0:645:4894 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: daf54000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:646:4897 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:646 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:85565400 r4:85565400 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855caf8c r4:855cac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855caf8c r4:855a2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85565400 r8:855a2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2b00 r8:80287e08 r7:eb491e60 r6:855b1600 r5:85565400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855b2a80 INFO: task kworker/0:646:4897 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:4899 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:4899 tgid:4899 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855a2b80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855b2bc0 INFO: task kworker/0:647:4899 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: db07d000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855cb78c r4:855cb400 r10:61c88647 r9:85568000 r8:855a2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: db4fc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r5:00001000 r4:eb0cf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: db4fc000 e0047000 00000001 80239b98 7f07d000 00000001 r4:00000000 r5:8597c38c r4:8597c000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafa7000 r7:dddced80 r6:83018000 r5:855cbb8c r4:855a2d00 Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05d9dc0 r5:00001000 r4:eb0cb000 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) task:kworker/0:651 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856042c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85568c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cc38c r4:855cc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cc38c r4:855a2d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85568c00 r8:855a2dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2d80 r8:80287e08 r7:eb4c5e60 r6:855b1880 r5:85568c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85604000 INFO: task kworker/0:651:4907 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: db8bc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:4909 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:4909 tgid:4909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:8556c800 r4:8556c800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8556c800 r8:855a2e2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:652:4909 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dbe2b000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) INFO: task kworker/0:653:4910 blocked for more than 465 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cc78c r4:855cc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cc78c r4:855a2e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8556d400 r8:855a2eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2e80 r8:80287e08 r7:eb4dde60 r6:855b1980 r5:8556d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85604140 INFO: task kworker/0:653:4910 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) r4:82ac21e4 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e9d84 r8:00000002 r7:60000013 r6:eb4e9d8c r5:8556b000 r4:8556b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8556b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856048c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8556b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb319000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cd38c r4:855cd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cd38c r4:855a2f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8556b000 r8:855a2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a2f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a2f00 r8:80287e08 r7:eb4dde60 r6:855b1a00 r5:8556b000 Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85604240 INFO: task kworker/0:654:4912 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dc262000 e0047000 00000001 80239b98 7f07d000 00000001 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r5:00001000 r4:eb28b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:4918 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8556ec00 r8:855b1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: dcb62000 e0047000 00000001 80239b98 7f07d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:8506c780 Exception stack(0xe05d9fb0 to 0xe05d9ff8) task:kworker/0:656 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855cd78c r4:855cd400 r4:8560c000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:4922 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:85570c00 r4:85570c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85570c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85604b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85570c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cdb8c r4:855cd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cdb8c r4:8560c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85570c00 r8:8560c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8560c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560c080 r8:80287e08 r7:eb4f5e60 r6:855b1c80 r5:85570c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85604880 INFO: task kworker/0:657:4922 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dcb62000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:658:4924 blocked for more than 465 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8560c100 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85604940 INFO: task kworker/0:658:4924 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dd1bc000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 Not tainted 6.15.0-rc7-syzkaller #0 r5:85572400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855cdf8c r4:855cdc00 r4:8560c180 Exception stack(0xeb509fb0 to 0xeb509ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05d9d28 to 0xe05d9d70) 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:660:4927 blocked for more than 465 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85604e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85571800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb353000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ce38c r4:855ce000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ce38c r4:8560c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85571800 r8:8560c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8560c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560c200 r8:80287e08 r7:eb505e60 r6:855b1e00 r5:85571800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb511fb0 to 0xeb511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85604b00 INFO: task kworker/0:660:4927 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dd581000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 task:kworker/0:661 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:855ceb8c r4:855ce800 r10:61c88647 r9:85573000 r8:8560c2ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:8597c38c r4:8597c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 r4:85576000 r4:00000000 r4:00000000 r5:855cef8c r4:855cec00 r10:61c88647 r9:85576000 r8:8560c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: ddb3f000 e0047000 00000001 80239b98 7f07d000 00000001 r4:e05d9dc0 r5:00001000 r4:eb0cb000 r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85574800 r8:8560c42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8560c400 r8:80287e08 r7:eb3a5e60 r6:8561b000 r5:85574800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85599b40 INFO: task kworker/0:664:4935 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: ddde7000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:4937 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:665 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:8556e000 r4:8556e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8556e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8556e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855cff8c r4:855cfc00 r10:61c88647 r9:8556e000 r8:8560c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 9fa0: 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855cfb8c r4:855cf800 r4:8560c500 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:4941 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:4941 tgid:4941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:85578c00 r4:85578c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85578c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85578c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d0b8c r4:855d0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d0b8c r4:8560c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85578c00 r8:8560c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8560c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560c580 r8:80287e08 r7:eb529e60 r6:8561b180 r5:85578c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619140 INFO: task kworker/0:667:4941 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dec7c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:668:4943 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:668 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:85578000 r4:85578000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85578000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855d038c r4:855d0000 r10:61c88647 r9:85578000 r8:8560c62c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: dec7c000 e0047000 00000001 80239b98 7f07d000 00000001 r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506bc80 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r5:00001000 r4:ea893000 r7:dddced80 r6:83018000 r5:855d078c r4:8560c680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: dec7c000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r5:84b85400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b85400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d138c r4:855d1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d138c r4:8560c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8560c780 r8:80287e08 r7:eb539e60 r6:8560c800 r5:84b85400 Workqueue: events bpf_prog_free_deferred 9d20: dec7c000 e0047000 00000001 80239b98 7f07d000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:671:4950 blocked for more than 465 seconds. r5:83ae8000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855d0f8c r4:855d0c00 r4:8560c880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: df249000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:4953 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855d178c r4:855d1400 r10:61c88647 r9:83ae8c00 r8:8560c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r4:00000001 r4:8506bc80 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05d9d28 to 0xe05d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r5:8597c38c r4:8597c000 r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 INFO: task kworker/0:674:4956 blocked for more than 465 seconds. r5:83aea400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aea400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d1f8c r4:855d1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d1f8c r4:8560cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aea400 r8:8560cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8560cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560cb80 r8:80287e08 r7:eb555e60 r6:8560cc00 r5:83aea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619c80 INFO: task kworker/0:674:4956 is blocked on a mutex likely owned by task kworker/0:208:3739. task:kworker/0:208 state:R running task stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05d9d28 to 0xe05d9d70) 9d20: dff03000 e0047000 00000001 80239b98 7f07d000 00000001 9d40: 82ac15a0 7f07d000 e0047000 8280c928 82ac21c4 e05d9da4 e05d9da8 e05d9d78 9d60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05d9dc0 r5:e05d9e08 r4:e05d9dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ce40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597c38c r4:8597c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597c38c r4:8506c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:8506c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506c780 r8:80287e08 r7:e05d1e60 r6:8506c800 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506bc80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:4958 blocked for more than 465 seconds. task:kworker/0:675 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560dc40 r5:855d238c r4:855d2000 r4:8560cc80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84894800 r8:80200be4 r7:e05d9d5c r6:ffffffff r5:84894800 r4:e05d9dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05d9fb0 to 0xe05d9ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:83aebc00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855d278c r4:855d2400 r10:00000000 r9:8560cd80 r8:80287e08 r7:eb55de60 r6:8560ce00 r5:83aebc00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83aec800 r8:8560ceac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:83aed400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83aed400 r8:8560cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8560cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560cf80 r8:80287e08 r7:eb565e60 r6:85636000 r5:83aed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85630240 INFO: task kworker/0:678:4965 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:679:4966 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/0:679 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855d338c r4:855d3000 r10:61c88647 r9:83aeec00 r8:856360ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:4968 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:84aa0000 r4:84aa0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855dc38c r4:855dc000 r10:61c88647 r9:84aa0000 r8:856361ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84aa2400 r8:856362ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:4974 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:84aa3000 r4:84aa3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85630b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d3f8c r4:855d3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d3f8c r4:85636380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa3000 r8:856363ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85636380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85636380 r8:80287e08 r7:eb551e60 r6:85636400 r5:84aa3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85630a00 INFO: task kworker/0:682:4974 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:4975 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:4975 tgid:4975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:84aa3c00 r4:84aa3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84aa3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb57dfb0 to 0xeb57dff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:84aa4800 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855dc78c r4:855dc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855dc78c r4:85636580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa4800 r8:856365ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85636580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85636580 r8:80287e08 r7:eb57de60 r6:85636600 r5:84aa4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85630a00 INFO: task kworker/0:684:4976 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 r5:00001000 r4:e0053000 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:84aa5400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855de38c r4:855de000 r10:61c88647 r9:84aa5400 r8:8561b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:685:4980 blocked for more than 465 seconds. r5:84aa6000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855dcb8c r4:855dc800 r10:61c88647 r9:84aa6000 r8:8563672c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:686:4983 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:84aa6c00 r4:84aa6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85635200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aa6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb211000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855dd38c r4:855dd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855dd38c r4:85636800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa6c00 r8:8563682c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:687:4985 blocked for more than 465 seconds. r4:84aa0c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85635480 r5:855dd78c r4:855dd400 r10:61c88647 r9:84aa0c00 r8:8563692c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85635080 INFO: task kworker/0:687:4985 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:4987 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84aa1800 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855deb8c r4:855de800 r10:61c88647 r9:84aa1800 r8:85636a2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:689:4989 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:83aee000 r4:83aee000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83aee000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856355c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aee000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ddb8c r4:855dd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ddb8c r4:85636b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aee000 r8:85636b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85636b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85636b00 r8:80287e08 r7:eb591e60 r6:85636b80 r5:83aee000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84a18000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r5:00001000 r4:eb3c7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:691:4992 blocked for more than 465 seconds. r5:84a18c00 r4:8291a680 r4:00000000 r4:00000000 r5:855de78c r4:855de400 r4:85636d00 Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:4994 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a5d84 r8:00000002 r7:60000113 r6:eb5a5d8c r5:84a19800 r4:84a19800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a19800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a19800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb667000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7838c r4:84a78000 r7:ddde2d80 r6:83018200 r5:84a7838c r4:8561b300 r10:00000000 r9:8561b300 r8:80287e08 r7:eb4a5e60 r6:85636e00 r5:84a19800 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855def8c r4:85636e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a1a400 r8:85636eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85636e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85636e80 r8:80287e08 r7:eb591e60 r6:85636f00 r5:84a1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85635e00 INFO: task kworker/0:692:4997 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:00001000 r4:e0053000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:693:4998 blocked for more than 465 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855df78c r4:855df400 r10:61c88647 r9:84a1bc00 r8:856470ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:694:5002 is blocked on a mutex likely owned by task kworker/1:7:3126. dd60: 80230ad0 80239bb0 900f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000013 r6:eb5d9d8c r5:84a1c800 r4:84a1c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a1c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855dfb8c r4:855df800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855dfb8c r4:85647180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a1c800 r8:856471ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647180 r8:80287e08 r7:eb5b5e60 r6:85647200 r5:84a1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856481c0 INFO: task kworker/0:695:5004 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a1d400 r8:856472ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e438c r4:855e4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e438c r4:85647380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a1e000 r8:856473ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647380 r8:80287e08 r7:eb5c1e60 r6:85647400 r5:84a1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85648380 INFO: task kworker/0:697:5007 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855e478c r4:855e4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e478c r4:85647480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557c800 r8:856474ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647480 r8:80287e08 r7:eb5e5e60 r6:8561b380 r5:8557c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85648480 INFO: task kworker/0:698:5009 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:699:5011 blocked for more than 465 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:8557bc00 r4:8557bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8557bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8557bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb613000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e4b8c r4:855e4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e4b8c r4:85647500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557bc00 r8:8564752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647500 r8:80287e08 r7:eb601e60 r6:8561b400 r5:8557bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8557e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8557e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb623000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e4f8c r4:855e4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e4f8c r4:85647580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557e000 r8:856475ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647580 r8:80287e08 r7:eb611e60 r6:8561b480 r5:8557e000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb63f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e578c r4:855e5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e578c r4:85647600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557a400 r8:8564762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647600 r8:80287e08 r7:eb621e60 r6:8561b500 r5:8557a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856489c0 INFO: task kworker/0:701:5015 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:702:5017 blocked for more than 465 seconds. r5:8557d400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85647680 r8:80287e08 r7:eb631e60 r6:8561b580 r5:8557d400 INFO: task kworker/0:702:5017 is blocked on a mutex likely owned by task kworker/1:7:3126. dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565b3c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8557ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e678c r4:855e6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e678c r4:85647700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557ec00 r8:8564772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647700 r8:80287e08 r7:eb631e60 r6:8561b600 r5:8557ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85648a80 INFO: task kworker/0:703:5019 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:704:5020 blocked for more than 465 seconds. r5:84a1ec00 r4:8291a680 r4:00000000 r4:00000000 r5:855e5b8c r4:855e5800 r10:61c88647 r9:84a1ec00 r8:856477ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aa8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85647880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:5025 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:84aaa400 r4:84aaa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aaa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565b140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aaa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb683000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e638c r4:855e6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e638c r4:85647980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aaa400 r8:856479ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647980 r8:80287e08 r7:eb651e60 r6:85647a00 r5:84aaa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85626d80 INFO: task kworker/0:706:5025 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:241:5026 blocked for more than 465 seconds. r4:84aab000 r4:00000000 r4:00000000 r5:84a73f8c r4:84a73c00 r10:61c88647 r9:84aab000 r8:8561b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:5029 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb68dd84 r8:00000002 r7:60000113 r6:eb68dd8c r5:84aabc00 r4:84aabc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aabc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84aabc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 r5:84a73b8c r4:84a73800 r10:61c88647 r9:84aabc00 r8:8561b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:84aa9800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565b540 r7:dddced80 r6:83018000 r5:855e6b8c r4:85647b80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:708:5032 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:708 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:84aad400 r4:84aad400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aad400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565b7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aad400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855e6f8c r4:85647c80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r5:00001000 r4:e0053000 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84aa8c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:dfa0ddc0 r5:00001000 r4:e0053000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:710:5037 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:710 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5fdd84 r8:00000002 r7:60000013 r6:eb5fdd8c r5:84aae000 r4:84aae000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aae000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565b8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e738c r4:855e7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e738c r4:85647e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aae000 r8:85647eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647e80 r8:80287e08 r7:eb6a1e60 r6:85647f00 r5:84aae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565b940 INFO: task kworker/0:710:5037 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:dfa0ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:5039 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:84aaec00 r4:84aaec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aaec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aaec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f0b8c r4:855f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f0b8c r4:85647f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aaec00 r8:85647fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85647f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85647f80 r8:80287e08 r7:eb6a1e60 r6:8565f000 r5:84aaec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:711:5039 is blocked on a mutex likely owned by task kworker/1:7:3126. dd60: 80230ad0 80239bb0 900f0013 ffffffff r4:00000000 r5:84af7b8c r4:84af7800 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8565f080 r8:80287e08 r7:eb65de60 r6:8565f100 r5:85680c00 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 900f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:713:5043 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6ddd84 r8:00000002 r7:60000113 r6:eb6ddd8c r5:85681800 r4:85681800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85681800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfa83000 r5:855e7f8c r4:855e7c00 r10:61c88647 r9:85681800 r8:8565f1ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 r4:85682400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r5:00001000 r4:dfbc9000 r7:dddced80 r6:83018000 r5:855f038c r4:8565f280 r10:00000000 r9:8565f280 r8:80287e08 r7:eb65de60 r6:8565f300 r5:85682400 INFO: task kworker/0:714:5046 is blocked on a mutex likely owned by task kworker/1:7:3126. r5:900f0013 r4:80239bb0 r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c1d84 r8:00000002 r7:60000113 r6:eb6c1d8c r5:85683000 r4:85683000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85683000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85683000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f078c r4:855f0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f078c r4:8565f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85683000 r8:8565f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565f380 r8:80287e08 r7:eb65de60 r6:8565f400 r5:85683000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a080 INFO: task kworker/0:715:5047 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7f6ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:716:5049 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:716 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb479d84 r8:00000002 r7:60000113 r6:eb479d8c r5:85683c00 r4:85683c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85683c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565aa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85683c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f1b8c r4:855f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f1b8c r4:8565f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85683c00 r8:8565f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:855f0f8c r4:855f0c00 r10:61c88647 r9:85684800 r8:8565f5ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85685400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85685400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f138c r4:855f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f138c r4:8565f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85685400 r8:8565f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565f680 r8:80287e08 r7:eb479e60 r6:8565f700 r5:85685400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a6c0 INFO: task kworker/0:718:5053 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:5056 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:85686000 r4:85686000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85686000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a900 r5:855f178c r4:855f1400 r10:61c88647 r9:85686000 r8:8565f7ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:5058 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6edd84 r8:00000002 r7:60000013 r6:eb6edd8c r5:85576c00 r4:85576c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85576c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855f278c r4:855f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8565f880 Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a9c0 INFO: task kworker/0:720:5058 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85579800 r4:8291a680 r4:00000000 r4:00000000 r5:855f1f8c r4:855f1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8565f900 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b50c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08 r5:855f238c r4:855f2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:5063 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:5063 tgid:5063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6fdd84 r8:00000002 r7:60000013 r6:eb6fdd8c r5:84b51800 r4:84b51800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b51800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84b51800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r7:dddced80 r6:83018000 r5:855f2b8c r4:8565fa00 r10:00000000 r9:8565fa00 r8:80287e08 r7:eb6ede60 r6:8561b900 r5:84b51800 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r4:00000000 r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b52400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855f2f8c r4:855f2c00 r10:61c88647 r9:84b52400 r8:8565faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fa80 r8:80287e08 r7:eb6fde60 r6:8561b980 r5:84b52400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565ad80 INFO: task kworker/0:724:5064 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84b53000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:84a7878c r4:84a78400 r10:61c88647 r9:84b53000 r8:8561ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8456a1c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:725:5070 blocked for more than 466 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:855f338c r4:855f3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:5072 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:5072 tgid:5072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb715d84 r8:00000002 r7:60000013 r6:eb715d8c r5:84b54800 r4:84b54800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b54800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b54800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb263000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f378c r4:855f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f378c r4:8565fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b54800 r8:8565fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fb80 r8:80287e08 r7:eb70de60 r6:8561bb80 r5:84b54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb715fb0 to 0xeb715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671080 INFO: task kworker/0:726:5072 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b56000 r8:8565fc2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:728:5075 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:728 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:84b55400 r4:84b55400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b55400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856714c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b55400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb289000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f3b8c r4:855f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f3b8c r4:8565fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b55400 r8:8565fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fc80 r8:80287e08 r7:eb719e60 r6:8561bc80 r5:84b55400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671380 INFO: task kworker/0:728:5075 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb729d84 r8:00000002 r7:60000113 r6:eb729d8c r5:84b56c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671a40 r7:dddced80 r6:83018000 r5:855f8b8c r4:8565fd00 r10:00000000 r9:8565fd00 r8:80287e08 r7:eb719e60 r6:8561bd00 r5:84b56c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8557b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856717c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8557b000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f838c r4:855f8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f838c r4:8565fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557b000 r8:8565fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fd80 r8:80287e08 r7:eb729e60 r6:8561bd80 r5:8557b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856712c0 INFO: task kworker/0:730:5079 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84867140 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r9:83018205 r8:85580000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r7:ddde2d80 r6:83018200 r5:8560378c r4:8561be00 r4:8561be00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:5084 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb739d84 r8:00000002 r7:60000013 r6:eb739d8c r5:85580c00 r4:85580c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85580c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85580c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb331000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f878c r4:855f8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f878c r4:8565fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85580c00 r8:8565fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fe00 r8:80287e08 r7:eb729e60 r6:8561bf00 r5:85580c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85582400 r4:00000000 r4:00000000 r5:855f8f8c r4:855f8c00 r10:61c88647 r9:85582400 r8:8565feac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:855fab8c r4:855fa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fab8c r4:8565ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85583c00 r8:8565ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ff00 r8:80287e08 r7:eb73de60 r6:84a8f000 r5:85583c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856718c0 INFO: task kworker/0:733:5087 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:734:5089 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:734 state:D stack:0 pid:5089 tgid:5089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:85585400 r4:85585400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85585400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85585400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f938c r4:855f9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f938c r4:8565ff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85585400 r8:8565ffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ff80 r8:80287e08 r7:eb5b1e60 r6:84a8f080 r5:85585400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:855f978c r4:855f9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f978c r4:84596000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85584800 r8:8459602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596000 r8:80287e08 r7:eb5b1e60 r6:84a8f100 r5:85584800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671b00 INFO: task kworker/0:735:5091 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:5093 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5f9d84 r8:00000002 r7:60000113 r6:eb5f9d8c r5:85586000 r4:85586000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85586000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85586000 r8:845960ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8871000 r5:855f9f8c r4:855f9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f9f8c r4:84596100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85586c00 r8:8459612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596100 r8:80287e08 r7:eb5b1e60 r6:84a8f200 r5:85586c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb60dfb0 to 0xeb60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671d80 INFO: task kworker/0:737:5095 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:841e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:855fa38c r4:855fa000 r10:61c88647 r9:841e0c00 r8:845961ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:5099 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:5099 tgid:5099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb71dd84 r8:00000002 r7:60000113 r6:eb71dd8c r5:85680000 r4:85680000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85680000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841db040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85680000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fa78c r4:855fa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fa78c r4:84596200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85680000 r8:8459622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596200 r8:80287e08 r7:eb5b1e60 r6:84596280 r5:85680000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb71dfb0 to 0xeb71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841db080 INFO: task kworker/0:739:5099 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:740:5102 blocked for more than 466 seconds. task:kworker/0:740 state:D stack:0 pid:5102 tgid:5102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:85686c00 r4:85686c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85686c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841db800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85686c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fb78c r4:855fb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fb78c r4:84596300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686c00 r8:8459632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596300 r8:80287e08 r7:eb5b1e60 r6:84596380 r5:85686c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841db180 INFO: task kworker/0:740:5102 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84b50000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:742:5105 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:742 state:D stack:0 pid:5105 tgid:5105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:84aac800 r4:84aac800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aac800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841dbd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aac800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560078c r4:85600400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560078c r4:84596500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aac800 r8:8459652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596500 r8:80287e08 r7:eb629e60 r6:84596580 r5:84aac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841db500 INFO: task kworker/0:742:5105 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84960000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r10:61c88647 r9:84960000 r8:8459662c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84960c00 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841dba80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84960c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fbf8c r4:855fbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fbf8c r4:84596700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84960c00 r8:8459672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596700 r8:80287e08 r7:eb645e60 r6:84596780 r5:84960c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841db9c0 INFO: task kworker/0:744:5112 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:745:5113 blocked for more than 466 seconds. r4:84961800 r4:00000000 r4:00000000 r5:8560038c r4:85600000 r10:61c88647 r9:84961800 r8:8459682c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb391000 r7:ddde2d80 r6:83018200 r5:856a038c r4:84a8f300 Exception stack(0xeb679fb0 to 0xeb679ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:5117 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:746 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000013 r6:eb69dd8c r5:84963000 r4:84963000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84963000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841db4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85600f8c r4:85600c00 r7:dddced80 r6:83018000 r5:85600f8c r4:84596980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1bb000 r7:dddced80 r6:83018000 r5:85600b8c r4:84596a80 r10:00000000 r9:84596a80 r8:80287e08 r7:eb69de60 r6:84596b00 r5:84963c00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:5121 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:84965400 r4:84965400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84965400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849120c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84965400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560138c r4:85601000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560138c r4:84596b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84965400 r8:84596bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596b80 r8:80287e08 r7:eb69de60 r6:84596c00 r5:84965400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:841dbfc0 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred r4:84966c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84966c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560178c r4:85601400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560178c r4:84596c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84966c00 r8:84596cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596c80 r8:80287e08 r7:eb741e60 r6:84596d00 r5:84966c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84912100 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:5125 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:85700000 r4:85700000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85700000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85601b8c r4:85601800 r7:dddced80 r6:83018000 r5:85601b8c r4:84596d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85701800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85601f8c r4:85601c00 r10:61c88647 r9:85701800 r8:84596eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84596e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84596e80 r8:80287e08 r7:eb749e60 r6:84596f00 r5:85701800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84912040 INFO: task kworker/0:751:5127 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:5129 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb751d84 r8:00000002 r7:60000013 r6:eb751d8c r5:85703000 r5:85703000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8560278c r4:85602400 r10:61c88647 r9:85703000 r8:84596fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84596f80 r8:80287e08 r7:eb74de60 r6:844ed000 r5:85703000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849126c0 INFO: task kworker/0:752:5129 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:5130 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb755d84 r8:00000002 r7:60000013 r6:eb755d8c r5:841e0000 r4:841e0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb377000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560238c r4:85602000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560238c r4:844ed080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e0000 r8:844ed0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed080 r8:80287e08 r7:eb751e60 r6:84a8f380 r5:841e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84912900 INFO: task kworker/0:753:5130 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:5133 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:841e3000 r4:841e3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 900f0013 ffffffff r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:754 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:841e4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560338c r4:85603000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560338c r4:844ed100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e4800 r8:844ed12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed100 r8:80287e08 r7:eb751e60 r6:84a8f500 r5:841e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84912c00 INFO: task kworker/0:754:5135 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:5137 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb765d84 r8:00000002 r7:60000013 r6:eb765d8c r5:841e5400 r4:841e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85602b8c r4:85602800 r4:844ed180 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 900f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb769d84 r8:00000002 r7:60000013 r6:eb769d8c r5:841e6000 r4:841e6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb401000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85602f8c r4:85602c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85602f8c r4:844ed200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e6000 r8:844ed22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed200 r8:80287e08 r7:eb761e60 r6:84a8f600 r5:841e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb769fb0 to 0xeb769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84912d80 INFO: task kworker/0:756:5139 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:757:5141 blocked for more than 466 seconds. r5:841e6c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85603b8c r4:85603800 r7:dddced80 r6:83018000 r5:85603b8c r4:844ed280 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:841e3c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a0b8c r4:856a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a0b8c r4:84a8f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e3c00 r8:84a8f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8f700 r8:80287e08 r7:eb6bde60 r6:84a8f780 r5:841e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456db80 INFO: task kworker/1:247:5143 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:758 state:D stack:0 pid:5145 tgid:5145 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:844ed300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:759:5146 blocked for more than 466 seconds. r4:85581800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85581800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8b280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85581800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85603f8c r4:85603c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85603f8c r4:844ed380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85581800 r8:844ed3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed380 r8:80287e08 r7:eb771e60 r6:84a8f880 r5:85581800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a8b180 INFO: task kworker/0:759:5146 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:5148 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:841e1800 r4:841e1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8b5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c478c r4:856c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c478c r4:844ed400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e1800 r8:844ed42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed400 r8:80287e08 r7:eb771e60 r6:84a8f900 r5:841e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb77dfb0 to 0xeb77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a8b200 INFO: task kworker/0:760:5148 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:856c5b8c r4:856c5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:844ed480 r8:80287e08 r7:eb77de60 r6:84a8f980 r5:84958c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:5152 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5152 tgid:5152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb789d84 r8:00000002 r7:60000113 r6:eb789d8c r5:84959800 r4:84959800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84959800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8b700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84959800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c4b8c r4:856c4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c4b8c r4:844ed500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84959800 r8:844ed52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed500 r8:80287e08 r7:eb785e60 r6:84a8fa00 r5:84959800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a8b440 INFO: task kworker/0:762:5152 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:8495b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8495b000 r8:844ed5ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred r5:84958000 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84958000 r8:844ed62c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/0:765 state:D stack:0 pid:5159 tgid:5159 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8bb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8495bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c578c r4:856c5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c578c r4:844ed680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495bc00 r8:844ed6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed680 r8:80287e08 r7:eb785e60 r6:84a8fb80 r5:8495bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a8b940 INFO: task kworker/0:765:5159 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:5162 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:8495c800 r4:8495c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8495c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8bdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8495c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c638c r4:856c6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c638c r4:844ed700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495c800 r8:844ed72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed700 r8:80287e08 r7:eb785e60 r6:84a8fc00 r5:8495c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a8bcc0 INFO: task kworker/0:766:5162 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:248 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8495d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:5165 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:5165 tgid:5165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:8495e000 r4:8495e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8495e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84808680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a178c r4:856a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a178c r4:84a8fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495e000 r8:84a8fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8fd80 r8:80287e08 r7:eb799e60 r6:84a8fe00 r5:8495e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491b140 INFO: task kworker/1:249:5165 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 r4:dfa0ddc0 r5:00001000 r4:e0053000 r5:84af7b8c r4:84af7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:767:5167 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r4:8495ec00 r5:8495ec00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856c5f8c r4:856c5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:844ed780 r8:80287e08 r7:eb6e5e60 r6:84a8fe80 r5:8495ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a8bdc0 INFO: task kworker/0:767:5167 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r5:8495a400 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:8495a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:856c6b8c r4:856c6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:844ed800 r8:80287e08 r7:eb6e5e60 r6:84a8ff00 r5:8495a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:85700c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:5174 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:85705400 r4:85705400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85705400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849144c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85705400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c778c r4:856c7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c778c r4:844ed980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85705400 r8:844ed9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ed980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ed980 r8:80287e08 r7:eb7a9e60 r6:844eda00 r5:85705400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84914040 INFO: task kworker/0:770:5174 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85706c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856c6f8c r4:856c6c00 r7:dddced80 r6:83018000 r5:856c6f8c r4:844eda80 r10:61c88647 r9:85706c00 r8:844edaac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:772:5178 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:772 state:D stack:0 pid:5178 tgid:5178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000013 r6:eb5bdd8c r5:85706000 r4:85706000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85706000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85706000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c738c r4:856c7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c738c r4:844edb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85706000 r8:844edbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844edb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844edb80 r8:80287e08 r7:eb7b1e60 r6:844edc00 r5:85706000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84914180 INFO: task kworker/0:772:5178 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 task:kworker/0:773 state:D stack:0 pid:5180 tgid:5180 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r9:83018005 r8:848b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r7:dddced80 r6:83018000 r5:856c7b8c r4:844edc80 r4:844edc80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:5182 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:5182 tgid:5182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:848b2400 r4:848b2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573138c r4:85731000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573138c r4:844edd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b2400 r8:844edd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844edd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844edd00 r8:80287e08 r7:eb5ede60 r6:841c5000 r5:848b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84914440 INFO: task kworker/0:774:5182 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84867140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:856c7f8c r4:844edd80 r10:61c88647 r9:848b0c00 r8:844eddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844edd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844edd80 r8:80287e08 r7:eb619e60 r6:841c5080 r5:848b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84914440 INFO: task kworker/0:775:5183 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:5185 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b9d84 r8:00000002 r7:60000113 r6:eb7b9d8c r5:848b1800 r4:848b1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:84af7b8c r4:84af7800 r4:00000001 r4:84867140 task:kworker/0:777 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8573078c r4:85730400 r7:dddced80 r6:83018000 r5:8573078c r4:844ede80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b3000 r8:844edeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844ede80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844ede80 r8:80287e08 r7:eb619e60 r6:841c5180 r5:848b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84914780 INFO: task kworker/0:777:5187 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 7fd87000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:5189 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb7c9d84 r8:00000002 r7:60000113 r6:eb7c9d8c r5:848b5400 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eafbf000 r5:85730b8c r4:85730800 r10:61c88647 r9:848b5400 r8:844edf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849148c0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb031000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85730f8c r4:85730c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85730f8c r4:844edf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b4800 r8:844edfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844edf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844edf80 r8:80287e08 r7:eb619e60 r6:841c5280 r5:848b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84914a00 INFO: task kworker/0:779:5191 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 81724000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8573278c r4:85732400 r7:dddced80 r6:83018000 r5:8573278c r4:848e1000 r10:00000000 r9:848e1000 r8:80287e08 r7:eb619e60 r6:841c5300 r5:848b3c00 r4:84914b40 INFO: task kworker/0:780:5193 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 81cfd000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:5195 blocked for more than 467 seconds. task:kworker/0:781 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8573178c r4:85731400 r7:dddced80 r6:83018000 r5:8573178c r4:848e1080 r4:00000001 r4:84914e40 INFO: task kworker/0:781:5195 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 81cfd000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856c8c00 r8:848e112c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85731f8c r4:85731c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85731f8c r4:848e1180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ca400 r8:848e11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e1180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e1180 r8:80287e08 r7:eb7d9e60 r6:841c5480 r5:856ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491be40 INFO: task kworker/0:783:5199 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 81cfd000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r4:84864380 r4:00000001 r4:84867140 task:kworker/0:784 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r5:8573238c r4:85732000 r7:dddced80 r6:83018000 r5:8573238c r4:848e1200 r10:00000000 r9:848e1200 r8:80287e08 r7:eb7d9e60 r6:841c5500 r5:856c9800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:5203 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:856c8000 r4:856c8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb3d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85732f8c r4:85732c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85732f8c r4:848e1280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c8000 r8:848e12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e1280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e1280 r8:80287e08 r7:eb7d9e60 r6:841c5580 r5:856c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848243c0 INFO: task kworker/0:785:5203 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 825da000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:856cb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb227000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85732b8c r4:85732800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85732b8c r4:848e1300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856cb000 r8:848e132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e1300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e1300 r8:80287e08 r7:eb801e60 r6:841c5600 r5:856cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824440 INFO: task kworker/0:786:5205 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:250:5210 blocked for more than 467 seconds. r4:856cc800 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb38f000 r5:856a1b8c r4:856a1800 r10:61c88647 r9:856cc800 r8:841c56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:251 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84a79b8c r4:841c5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856cd400 r8:841c57ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:841c5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841c5780 r8:80287e08 r7:eb799e60 r6:841c5800 r5:856cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84808500 INFO: task kworker/1:251:5211 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 82b4a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:787:5213 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:5213 tgid:5213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:856cec00 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8573338c r4:85733000 r7:dddced80 r6:83018000 r5:8573338c r4:848e1380 r4:00000001 r4:84824680 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85733b8c r4:85733800 r7:dddced80 r6:83018000 r5:85733b8c r4:848e1400 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824680 INFO: task kworker/0:788:5215 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8312f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:5216 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb821d84 r8:00000002 r7:60000113 r6:eb821d8c r5:856ce000 r4:856ce000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ce000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:8573378c r4:85733400 r7:dddced80 r6:83018000 r5:8573378c r4:848e1480 r10:00000000 r9:848e1480 r8:80287e08 r7:eb81de60 r6:841c5980 r5:856ce000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:5218 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb829d84 r8:00000002 r7:60000113 r6:eb829d8c r5:856d0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r5:00001000 r4:eb4d7000 r5:8573838c r4:85738000 r10:61c88647 r9:856d0c00 r8:848e152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84824b00 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:791:5221 blocked for more than 467 seconds. r4:85703c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85703c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb497000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85733f8c r4:85733c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85733f8c r4:848e1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85703c00 r8:848e15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e1580 r8:80287e08 r7:eb829e60 r6:848e1600 r5:85703c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824c40 INFO: task kworker/0:791:5221 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 837d4000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb82dd84 r8:00000002 r7:60000113 r6:eb82dd8c r5:85704800 r4:85704800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85704800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb82de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85704800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573878c r4:85738400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573878c r4:848e1680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85704800 r8:848e16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e1680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e1680 r8:80287e08 r7:eb829e60 r6:848e1700 r5:85704800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824bc0 INFO: task kworker/0:792:5224 is blocked on a mutex likely owned by task kworker/1:7:3126. [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85583000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 Workqueue: events bpf_prog_free_deferred r5:84964800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85738b8c r4:85738800 r10:61c88647 r9:84964800 r8:848e182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8456a880 Call trace: r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 83f55000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:5229 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:5229 tgid:5229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb839d84 r8:00000002 r7:60000113 r6:eb839d8c r5:856d3000 r4:856d3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856d3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb51b000 r5:85738f8c r4:85738c00 r10:61c88647 r9:856d3000 r8:848e192c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84966000 r8:848e19ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:796:5233 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:5233 tgid:5233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb83dd84 r8:00000002 r7:60000113 r6:eb83dd8c r5:84920000 r4:84920000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84920000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ff280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573938c r4:85739000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573938c r4:848e1a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84920000 r8:848e1aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e1a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e1a80 r8:80287e08 r7:eb835e60 r6:848e1b00 r5:84920000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ff100 INFO: task kworker/0:796:5233 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8448f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5dd000 r7:dddced80 r6:83018000 r5:85739f8c r4:848e1b80 r10:00000000 r9:848e1b80 r8:80287e08 r7:eb835e60 r6:848e1c00 r5:84920c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:85739b8c r4:85739800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85739b8c r4:848e1c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84921800 r8:848e1cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e1c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e1c80 r8:80287e08 r7:eb841e60 r6:848e1d00 r5:84921800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ff440 INFO: task kworker/0:798:5237 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 84965000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:799:5239 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:799 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84922400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848e1d80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:84923000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ff900 INFO: task kworker/0:800:5240 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8546d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:801:5244 blocked for more than 467 seconds. r5:84923c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848e1f80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ff800 INFO: task kworker/0:801:5244 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8546d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84924800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ffd80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84855080 r8:80287e08 r7:eb84de60 r6:84855100 r5:84924800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:803:5247 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:803 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb85dd84 r8:00000002 r7:60000013 r6:eb85dd8c r5:856d1800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856d1800 r8:848551ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:804:5249 blocked for more than 467 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaaad000 r5:8573b38c r4:8573b000 r10:61c88647 r9:856d2400 r8:8485522c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 85dcf000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:805:5251 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:805 state:D stack:0 pid:5251 tgid:5251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb865d84 r8:00000002 r7:60000013 r6:eb865d8c r5:856d4800 r4:856d4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856d4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824d80 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8573b78c r4:8573b400 r4:84855280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 r5:84af7b8c r4:84af7800 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:806:5253 blocked for more than 467 seconds. r4:856d5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r5:00001000 r4:eaf99000 r7:dddced80 r6:83018000 r5:8573bf8c r4:84855300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:807:5255 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:807 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:856d6000 r4:856d6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856d6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484c480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574038c r4:85740000 r7:dddced80 r6:83018000 r5:8574038c r4:84855380 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb871d84 r8:00000002 r7:60000113 r6:eb871d8c r5:856d6c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5258 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:856d3c00 r4:856d3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856d3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484c5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb277000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574078c r4:85740400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574078c r4:84855480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d3c00 r8:848554ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84855480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855480 r8:80287e08 r7:eb871e60 r6:841c5e80 r5:856d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c500 INFO: task kworker/0:809:5258 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 86b38000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856d0000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856d0000 r8:8485552c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:811 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85702400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574138c r4:85741000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574138c r4:84855580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85702400 r8:848555ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84855580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855580 r8:80287e08 r7:eb871e60 r6:841c5f80 r5:85702400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c840 INFO: task kworker/0:811:5264 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 86b38000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:5266 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:856cbc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84abf000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456f600 INFO: task kworker/1:253:5266 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 87003000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:5268 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856d8000 r8:8485562c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:813 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484ccc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb691000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85741b8c r4:85741800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85741b8c r4:84855680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d9800 r8:848556ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84855680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855680 r8:80287e08 r7:eb881e60 r6:84abf180 r5:856d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb889fb0 to 0xeb889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:813:5270 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 87240000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:814:5272 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:814 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:856d8c00 r4:856d8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856d8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484ce00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85741f8c r4:85741c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85741f8c r4:84855700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d8c00 r8:8485572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84855700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855700 r8:80287e08 r7:eb889e60 r6:84abf200 r5:856d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:8574238c r4:84855780 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/0:816 state:D stack:0 pid:5276 tgid:5276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8a1d84 r8:00000002 r7:60000013 r6:eb8a1d8c r5:856da400 r4:856da400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856da400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84808080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856da400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85742b8c r4:85742800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85742b8c r4:84855800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856da400 r8:8485582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84855800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855800 r8:80287e08 r7:eb89de60 r6:84abf300 r5:856da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a1fb0 to 0xeb8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc80 INFO: task kworker/0:816:5276 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 87b07000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:856db000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84855880 Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb8b1d84 r8:00000002 r7:60000113 r6:eb8b1d8c r5:856dbc00 r4:856dbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856dbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481b100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb711000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85742f8c r4:85742c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85742f8c r4:84855900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856dbc00 r8:8485592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84855900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855900 r8:80287e08 r7:eb8a1e60 r6:84abf400 r5:856dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b1fb0 to 0xeb8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84808c40 INFO: task kworker/0:818:5280 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 87fed000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb735000 r5:8574338c r4:85743000 r4:84855980 Exception stack(0xeb8bdfb0 to 0xeb8bdff8) Workqueue: events bpf_prog_free_deferred dd20: 87fed000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574378c r4:85743400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574378c r4:84855a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e0000 r8:84855a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84855a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855a00 r8:80287e08 r7:eb8bde60 r6:84abf500 r5:856e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481b1c0 INFO: task kworker/0:820:5284 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 88223000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:821 state:D stack:0 pid:5287 tgid:5287 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e3000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84855b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84855b00 r8:80287e08 r7:eb8d9e60 r6:84abf600 r5:856e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481b2c0 INFO: task kworker/0:822:5288 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8864b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:823:5289 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:823 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84926c00 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84855b80 r8:80287e08 r7:eb8d9e60 r6:84855c00 r5:84926c00 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84926000 r8:84855cac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 88f3b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:825:5294 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:825 state:D stack:0 pid:5294 tgid:5294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:84925400 r4:84925400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84925400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84855d80 r8:80287e08 r7:eb8d9e60 r6:84855e00 r5:84925400 r4:8481b8c0 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:826:5296 blocked for more than 467 seconds. r5:841a0000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481b9c0 INFO: task kworker/0:826:5296 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 89167000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:827:5298 blocked for more than 467 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481bdc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84855f80 r8:80287e08 r7:eb8d9e60 r6:84a9e000 r5:841a0c00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:841a2400 r8:84a9e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:829:5302 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:829 state:D stack:0 pid:5302 tgid:5302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb931d84 r8:00000002 r7:60000013 r6:eb931d8c r5:841a1800 r4:841a1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841a1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abc040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb939000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85745b8c r4:85745800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85745b8c r4:84a9e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841a1800 r8:84a9e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a9e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9e180 r8:80287e08 r7:eb925e60 r6:84a9e200 r5:841a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb931fb0 to 0xeb931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8456fac0 INFO: task kworker/0:829:5302 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8955b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:830:5305 blocked for more than 467 seconds. r5:841a4800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84a9e280 r8:80287e08 r7:eb931e60 r6:84a9e300 r5:841a4800 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:5306 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb955d84 r8:00000002 r7:60000113 r6:eb955d8c r5:841a3c00 r4:841a3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841a3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84801e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb975000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a2f8c r4:856a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a2f8c r4:84abf680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841a3c00 r8:84abf6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84abf680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abf680 r8:80287e08 r7:eb805e60 r6:84a9e380 r5:841a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb955fb0 to 0xeb955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84801940 INFO: task kworker/1:254:5306 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8955b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a9e400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 89978000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb961000 r7:dddced80 r6:83018000 r5:8574678c r4:84a9e500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 89bd3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:5312 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:5312 tgid:5312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:841a6c00 r4:841a6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841a6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abc940 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:841a6c00 r8:84a9e62c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:834:5314 blocked for more than 468 seconds. r4:841a5400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abcc00 r5:85746f8c r4:85746c00 r10:61c88647 r9:841a5400 r8:84a9e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a9e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9e700 r8:80287e08 r7:eb885e60 r6:84a9e780 r5:841a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84abc740 INFO: task kworker/0:834:5314 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8a0ff000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:5316 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85710c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfa0: 00000000 00000000 00000000 00000000 r4:84867140 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85710000 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8574738c r4:84a9e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85710000 r8:84a9e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a9e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9e880 r8:80287e08 r7:eb96de60 r6:84a9e900 r5:85710000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84abc740 INFO: task kworker/0:835:5318 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8a0ff000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:836:5320 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:836 state:D stack:0 pid:5320 tgid:5320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a1d84 r8:00000002 r7:60000113 r6:eb9a1d8c r5:85713000 r4:85713000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85713000 r8:84a9e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 8a6fd000 eb0cd000 00000001 80239b98 7f13f000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85712400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85712400 r8:84a9eaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8a6fd000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:838:5324 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:838 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb985d84 r8:00000002 r7:60000013 r6:eb985d8c r5:85713c00 r4:85713c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85713c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575438c r4:85754000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575438c r4:84a9eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85713c00 r8:84a9ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a9eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9eb80 r8:80287e08 r7:eb9a1e60 r6:84a9ec00 r5:85713c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f81c0 INFO: task kworker/0:838:5324 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8aed8000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb9b5000 r5:85747f8c r4:85747c00 r10:61c88647 r9:85714800 r8:84a9ecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a9ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9ec80 r8:80287e08 r7:eb985e60 r6:84a9ed00 r5:85714800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8380 INFO: task kworker/0:839:5326 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8aed8000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:840:5328 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:840 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:85715400 r4:85715400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85715400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f88c0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847f82c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8b3aa000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:841:5330 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:841 state:D stack:0 pid:5330 tgid:5330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:85716000 r4:85716000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85716000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f85c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575478c r4:85754400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575478c r4:84a9ee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716000 r8:84a9eeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a9ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9ee80 r8:80287e08 r7:eb9c1e60 r6:84a9ef00 r5:85716000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f83c0 INFO: task kworker/0:841:5330 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8b3aa000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:842:5333 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:842 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9cdd84 r8:00000002 r7:60000013 r6:eb9cdd8c r5:85716c00 r4:85716c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85716c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85754b8c r4:85754800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85754b8c r4:84a9ef80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716c00 r8:84a9efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a9ef80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9ef80 r8:80287e08 r7:eb9c1e60 r6:847f7000 r5:85716c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8900 INFO: task kworker/0:842:5333 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8b3aa000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:85711800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8575578c r4:847f7080 Exception stack(0xeb609fb0 to 0xeb609ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:e0053000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85720000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f89c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85720000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575538c r4:85755000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575538c r4:847f7180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85720000 r8:847f71ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847f7180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f7180 r8:80287e08 r7:eb609e60 r6:847f7200 r5:85720000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8ac0 INFO: task kworker/0:844:5336 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8bb75000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85720c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r7:dddced80 r6:83018000 r5:8575638c r4:847f7280 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 8bd45000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:5340 tgid:5340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000013 r6:eb9ddd8c r5:85721800 r4:85721800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85721800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85721800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85755b8c r4:85755800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85755b8c r4:847f7380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85721800 r8:847f73ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847f7380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f7380 r8:80287e08 r7:eb9d5e60 r6:847f7400 r5:85721800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8bc0 INFO: task kworker/0:846:5340 is blocked on a mutex likely owned by task kworker/1:7:3126. r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r5:00001000 r4:eaff5000 r7:dddced80 r6:83018000 r5:85755f8c r4:847f7480 r10:00000000 r9:847f7480 r8:80287e08 r7:eb9d5e60 r6:847f7500 r5:85723000 r4:847f8cc0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85723c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r5:85756b8c r4:85756800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85756b8c r4:847f7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85723c00 r8:847f75ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847f7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f7580 r8:80287e08 r7:eb9d5e60 r6:847f7600 r5:85723c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8cc0 INFO: task kworker/0:848:5344 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8c13f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:849:5347 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:849 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e9d84 r8:00000002 r7:60000013 r6:eb9e9d8c r5:85722400 r4:85722400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85722400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85722400 r8:847f76ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/0:850 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85756f8c r4:85756c00 r7:dddced80 r6:83018000 r5:85756f8c r4:847f7780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84abb140 INFO: task kworker/0:850:5349 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8c706000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:851:5351 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:851 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9edd84 r8:00000002 r7:60000013 r6:eb9edd8c r5:85726000 r4:85726000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85726000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85726000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb347000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8575738c r4:85757000 r10:61c88647 r9:85726000 r8:847f78ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abb2c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:852:5354 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:852 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85724800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 r9:83018005 r8:85724800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:8575778c r4:85757400 r10:61c88647 r9:85724800 r8:847f79ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:853:5356 blocked for more than 468 seconds. r4:84a20000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a20000 r8:847f7aac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84abb780 INFO: task kworker/0:853:5356 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8d75c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:854:5357 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:854 state:D stack:0 pid:5357 tgid:5357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9fdd84 r8:00000002 r7:60000013 r6:eb9fdd8c r5:84a20c00 r4:84a20c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a20c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:84a20c00 r8:847f7bac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:855:5358 blocked for more than 468 seconds. r4:84a21800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a21800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abbe00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a21800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576038c r4:85760000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576038c r4:847f7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a21800 r8:847f7cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847f7c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f7c80 r8:80287e08 r7:eb9fde60 r6:847f7d00 r5:84a21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84abb980 INFO: task kworker/0:855:5358 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8d75c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:856:5361 blocked for more than 468 seconds. r5:84a22400 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85760f8c r4:85760c00 r10:61c88647 r9:84a22400 r8:847f7dac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:857:5363 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba09d84 r8:00000002 r7:60000013 r6:eba09d8c r5:84a24800 r4:84a24800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a24800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456abc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a24800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb485000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576078c r4:85760400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576078c r4:847f7e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a24800 r8:847f7eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847f7e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f7e80 r8:80287e08 r7:eba05e60 r6:847f7f00 r5:84a24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84abb980 INFO: task kworker/0:857:5363 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8e312000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 r5:00001000 r4:eb49f000 r10:61c88647 r9:856e3c00 r8:847f7fac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:dfa0ddc0 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r9:83018005 r8:856e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r10:00000000 r9:85769000 r8:80287e08 r7:eba05e60 r6:84abf800 r5:856e6c00 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b140 INFO: task kworker/0:859:5367 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8e312000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:61c88647 r9:856e6000 r8:857690ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:dfa0ddc0 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb525000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85761b8c r4:85761800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85761b8c r4:85769100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e0c00 r8:8576912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769100 r8:80287e08 r7:eba15e60 r6:84abf900 r5:856e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b200 INFO: task kworker/0:861:5372 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8e898000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84af7b8c r4:84af7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85761f8c r4:85761c00 r4:00000001 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0053000 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/0:863 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba11d84 r8:00000002 r7:60000113 r6:eba11d8c r5:84a25400 r4:84a25400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a25400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576b840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a25400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576238c r4:85762000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576238c r4:85769280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a25400 r8:857692ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769280 r8:80287e08 r7:eb9f1e60 r6:85769300 r5:84a25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba11fb0 to 0xeba11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b4c0 INFO: task kworker/0:863:5375 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8ed24000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:864:5377 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:864 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:84a26000 r4:84a26000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a26000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84a26000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 r5:85762f8c r4:85762c00 r7:dddced80 r6:83018000 r5:85762f8c r4:85769380 r10:61c88647 r9:84a26000 r8:857693ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8576b640 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:865:5380 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:865 state:D stack:0 pid:5380 tgid:5380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba31d84 r8:00000002 r7:60000113 r6:eba31d8c r5:84a26c00 r4:84a26c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a26c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576b980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576278c r4:85762400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576278c r4:85769480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a26c00 r8:857694ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769480 r8:80287e08 r7:eba25e60 r6:85769500 r5:84a26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b800 INFO: task kworker/0:865:5380 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8f110000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:866:5381 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:866 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba35d84 r8:00000002 r7:60000013 r6:eba35d8c r5:84a23000 r4:84a23000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a23000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576bb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a23000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85762b8c r4:85762800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85762b8c r4:85769580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a23000 r8:857695ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769580 r8:80287e08 r7:eba25e60 r6:85769600 r5:84a23000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b900 INFO: task kworker/0:866:5381 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8f110000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:00001000 r4:e0053000 r4:84864380 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8576338c r4:85763000 r7:dddced80 r6:83018000 r5:8576338c r4:85769680 r10:61c88647 r9:85726c00 r8:857696ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:868:5385 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:868 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba2dd84 r8:00000002 r7:60000013 r6:eba2dd8c r5:857d8000 r4:857d8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576bfc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576378c r4:85763400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576378c r4:85769780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d8000 r8:857697ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769780 r8:80287e08 r7:eba39e60 r6:85769800 r5:857d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576bb40 INFO: task kworker/0:868:5385 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:5387 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:869 state:D stack:0 pid:5387 tgid:5387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba3dd84 r8:00000002 r7:60000013 r6:eba3dd8c r5:857d8c00 r4:857d8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577d280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb819000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85763f8c r4:85763c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85763f8c r4:85769880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d8c00 r8:857698ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769880 r8:80287e08 r7:eba2de60 r6:85769900 r5:857d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba3dfb0 to 0xeba3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576be40 INFO: task kworker/0:869:5387 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8f670000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:870:5389 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:870 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba45d84 r8:00000002 r7:60000113 r6:eba45d8c r5:857d9800 r4:857d9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba45e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577d040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85763b8c r4:85763800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85763b8c r4:85769980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d9800 r8:857699ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769980 r8:80287e08 r7:eba3de60 r6:85769a00 r5:857d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba45fb0 to 0xeba45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577d240 INFO: task kworker/0:870:5389 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8fbfa000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:857da400 r5:857da400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r9:83018005 r8:857da400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 r7:dddced80 r6:83018000 r5:8579438c r4:85769a80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 8fbfa000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:872:5392 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:872 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba51d84 r8:00000002 r7:60000113 r6:eba51d8c r5:857db000 r5:857db000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8579478c r4:85794400 r7:dddced80 r6:83018000 r5:8579478c r4:85769b80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 90256000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:857dbc00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:857dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 r5:85794b8c r4:85794800 r7:dddced80 r6:83018000 r5:85794b8c r4:85769c80 r10:61c88647 r9:857dbc00 r8:85769cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577d4c0 INFO: task kworker/0:873:5395 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 90256000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:874:5397 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:874 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba69d84 r8:00000002 r7:60000013 r6:eba69d8c r5:857dc800 r4:857dc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857dc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577d9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579538c r4:85795000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579538c r4:85769d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857dc800 r8:85769dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769d80 r8:80287e08 r7:eba5de60 r6:85769e00 r5:857dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577d840 INFO: task kworker/0:874:5397 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 90943000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:875:5399 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:875 state:D stack:0 pid:5399 tgid:5399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:857dd400 r4:857dd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857dd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577d880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85794f8c r4:85794c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85794f8c r4:85769e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857dd400 r8:85769eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769e80 r8:80287e08 r7:eba69e60 r6:85769f00 r5:857dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba75fb0 to 0xeba75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577d700 INFO: task kworker/0:875:5399 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 90943000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:876:5401 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba81d84 r8:00000002 r7:60000013 r6:eba81d8c r5:857de000 r4:857de000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857de000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577dbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579578c r4:85795400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579578c r4:85769f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857de000 r8:85769fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769f80 r8:80287e08 r7:eba69e60 r6:8578e000 r5:857de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba81fb0 to 0xeba81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577d840 INFO: task kworker/0:876:5401 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 90943000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:877:5403 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:877 state:D stack:0 pid:5403 tgid:5403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba8dd84 r8:00000002 r7:60000013 r6:eba8dd8c r5:857dec00 r4:857dec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857dec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577dd00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85795b8c r4:85795800 r10:61c88647 r9:857dec00 r8:8578e0ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 90d9f000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 r4:dfa0ddc0 r4:00000000 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:878:5405 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:878 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba41d84 r8:00000002 r7:60000013 r6:eba41d8c r5:841b0c00 r4:841b0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579638c r4:85796000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579638c r4:8578e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b0c00 r8:8578e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578e180 r8:80287e08 r7:eba8de60 r6:8578e200 r5:841b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba41fb0 to 0xeba41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577db80 INFO: task kworker/0:878:5405 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9113c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:879:5407 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:879 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaadd84 r8:00000002 r7:60000013 r6:ebaadd8c r5:841b0000 r4:841b0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577df80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85795f8c r4:85795c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85795f8c r4:8578e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b0000 r8:8578e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578e280 r8:80287e08 r7:eba41e60 r6:8578e300 r5:841b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaadfb0 to 0xebaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577dc40 INFO: task kworker/0:879:5407 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9113c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/0:880 state:D stack:0 pid:5409 tgid:5409 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579678c r4:85796400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579678c r4:8578e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b2400 r8:8578e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578e380 r8:80287e08 r7:eba41e60 r6:8578e400 r5:841b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850561c0 INFO: task kworker/0:880:5409 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 91630000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:881:5411 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:881 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab9d84 r8:00000002 r7:60000013 r6:ebab9d8c r5:841b3000 r4:841b3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85796f8c r4:85796c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85796f8c r4:8578e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b3000 r8:8578e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8578e480 r8:80287e08 r7:eba99e60 r6:8578e500 r5:841b3000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r4:dfa0ddc0 r4:00000000 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:882:5413 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:882 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:841b3c00 r4:841b3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85796b8c r4:85796800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85796b8c r4:8578e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b3c00 r8:8578e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578e580 r8:80287e08 r7:ebab9e60 r6:8578e600 r5:841b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850563c0 INFO: task kworker/0:882:5413 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 91630000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:883:5415 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:883 state:D stack:0 pid:5415 tgid:5415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:841b4800 r9:83018005 r8:841b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:8579738c r4:85797000 r10:61c88647 r9:841b4800 r8:8578e6ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8578e680 r8:80287e08 r7:ebab9e60 r6:8578e700 r5:841b4800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd20: 9176c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:884:5417 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:884 state:D stack:0 pid:5417 tgid:5417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:841b5400 r4:841b5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579778c r4:85797400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579778c r4:8578e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b5400 r8:8578e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578e780 r8:80287e08 r7:ebad1e60 r6:8578e800 r5:841b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850565c0 INFO: task kworker/0:884:5417 is blocked on a mutex likely owned by task kworker/1:7:3126. Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 r5:00001000 r4:e0053000 r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:841b6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850567c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85797b8c r4:85797800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85797b8c r4:8578e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b6000 r8:8578e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578e880 r8:80287e08 r7:ebadde60 r6:8578e900 r5:841b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850567c0 INFO: task kworker/0:885:5419 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 91acc000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:886:5421 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:886 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:841b6c00 r4:841b6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a438c r4:857a4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a438c r4:8578e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b6c00 r8:8578e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578e980 r8:80287e08 r7:ebae9e60 r6:8578ea00 r5:841b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850568c0 INFO: task kworker/0:886:5421 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 92269000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:887:5423 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:887 state:D stack:0 pid:5423 tgid:5423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb01d84 r8:00000002 r7:60000013 r6:ebb01d8c r5:841b1800 r4:841b1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85797f8c r4:85797c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85797f8c r4:8578ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b1800 r8:8578eaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578ea80 r8:80287e08 r7:ebaf5e60 r6:8578eb00 r5:841b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85056ac0 INFO: task kworker/0:887:5423 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9280c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:888:5425 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:888 state:D stack:0 pid:5425 tgid:5425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:84948000 r4:84948000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84948000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84948000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a478c r4:857a4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a478c r4:8578eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84948000 r8:8578ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578eb80 r8:80287e08 r7:ebaf5e60 r6:8578ec00 r5:84948000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85056b40 INFO: task kworker/0:888:5425 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9280c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:5427 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84948c00 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a4b8c r4:857a4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a4b8c r4:8578ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84948c00 r8:8578ecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578ec80 r8:80287e08 r7:ebb0de60 r6:8578ed00 r5:84948c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85056cc0 INFO: task kworker/0:889:5427 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 92d97000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:890:5430 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08 r9:83018005 r8:8494a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 r5:857a5b8c r4:857a5800 r7:dddced80 r6:83018000 r5:857a5b8c r4:8578ed80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8482a080 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 92d97000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:891:5431 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:891 state:D stack:0 pid:5431 tgid:5431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:8494b000 r4:8494b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8494b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482a440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8494b000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0043000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a4f8c r4:857a4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a4f8c r4:8578ee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8494b000 r8:8578eeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578ee80 r8:80287e08 r7:ebb35e60 r6:8578ef00 r5:8494b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482a080 INFO: task kworker/0:891:5431 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8494c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:857a578c r4:857a5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8494c800 r8:8578efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482a4c0 INFO: task kworker/0:892:5433 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 92d97000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:5436 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:5436 tgid:5436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:8494bc00 r4:8494bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8494bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85058600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a3b8c r4:856a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a3b8c r4:84abf980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8494bc00 r8:84abf9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84abf980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abf980 r8:80287e08 r7:eb805e60 r6:85059080 r5:8494bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85058400 INFO: task kworker/1:256:5436 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9341f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:893:5438 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:893 state:D stack:0 pid:5438 tgid:5438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb29d84 r8:00000002 r7:60000013 r6:ebb29d8c r5:8494e000 r4:8494e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8494e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482ac00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8494e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb249000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a5f8c r4:857a5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a5f8c r4:85059100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8494e000 r8:8505912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059100 r8:80287e08 r7:ebb35e60 r6:85059180 r5:8494e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb29fb0 to 0xebb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482a7c0 INFO: task kworker/0:893:5438 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9341f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:894:5441 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:894 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb90dd84 r8:00000002 r7:60000013 r6:eb90dd8c r5:84949800 r4:84949800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84949800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482aec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84949800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb291000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a638c r4:857a6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a638c r4:85059200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84949800 r8:8505922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059200 r8:80287e08 r7:ebb29e60 r6:85059280 r5:84949800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482aa80 INFO: task kworker/0:894:5441 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9341f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:5442 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:5442 tgid:5442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:8494ec00 r4:8494ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8494ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506eb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c8f8c r4:857c8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c8f8c r4:84abfa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8494ec00 r8:84abfa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84abfa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abfa00 r8:80287e08 r7:eb805e60 r6:85059300 r5:8494ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85058480 INFO: task kworker/1:257:5442 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 938ec000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:895:5443 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:895 state:D stack:0 pid:5443 tgid:5443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb3dd84 r8:00000002 r7:60000113 r6:ebb3dd8c r5:857e0c00 r4:857e0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb317000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a678c r4:857a6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a678c r4:85059380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e0c00 r8:850593ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059380 r8:80287e08 r7:eb90de60 r6:85059400 r5:857e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb3dfb0 to 0xebb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482ad40 INFO: task kworker/0:895:5443 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 93eb9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:896:5446 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:896 state:D stack:0 pid:5446 tgid:5446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:ebb41d84 r8:00000002 r7:60000113 r6:ebb41d8c r5:856e1800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:856e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb641000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a6f8c r4:857a6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a6f8c r4:85059480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e1800 r8:850594ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059480 r8:80287e08 r7:ebb3de60 r6:84abfa80 r5:856e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482af40 INFO: task kworker/0:896:5446 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 93eb9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:5449 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:5449 tgid:5449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb4dd84 r8:00000002 r7:60000113 r6:ebb4dd8c r5:856dd400 r4:856dd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856dd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb615000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a6b8c r4:857a6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a6b8c r4:85059500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856dd400 r8:8505952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059500 r8:80287e08 r7:ebb41e60 r6:84abfb00 r5:856dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:898:5450 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:898 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:856e5400 r4:856e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a7b8c r4:857a7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a7b8c r4:85059580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e5400 r8:850595ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059580 r8:80287e08 r7:ebb41e60 r6:84abfb80 r5:856e5400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857a738c r4:857a7000 r10:61c88647 r9:856e4800 r8:8505962c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 94a1a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:900:5453 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:900 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c9d84 r8:00000002 r7:60000113 r6:eb8c9d8c r5:857e1800 r4:857e1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c480 r9:83018005 r8:857e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:857a778c r4:857a7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857e1800 r8:850596ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 94bfb000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 r4:dfa0ddc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:901:5456 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r4:857e2400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a7f8c r4:857a7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a7f8c r4:85059780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e2400 r8:850597ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059780 r8:80287e08 r7:ebb51e60 r6:85059800 r5:857e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb59fb0 to 0xebb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8504c440 INFO: task kworker/0:901:5456 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 94bfb000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:902:5457 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:902 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000013 r6:eb8b5d8c r5:857e3000 r4:857e3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb707000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ac38c r4:857ac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ac38c r4:85059880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e3000 r8:850598ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:903:5460 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:903 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb61d84 r8:00000002 r7:60000113 r6:ebb61d8c r5:857e3c00 r4:857e3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504ca00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb725000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ac78c r4:857ac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ac78c r4:85059980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e3c00 r8:850599ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059980 r8:80287e08 r7:eb8b5e60 r6:85059a00 r5:857e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8504c700 INFO: task kworker/0:903:5460 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:857e4800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 r9:83018005 r8:857e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r7:dddced80 r6:83018000 r5:857acb8c r4:85059a80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 95978000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:905:5464 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:905 state:D stack:0 pid:5464 tgid:5464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb65d84 r8:00000002 r7:60000013 r6:ebb65d8c r5:857e5400 r4:857e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504cec0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:857ad38c r4:85059b80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:00000000 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:906:5466 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:906 state:D stack:0 pid:5466 tgid:5466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb71d84 r8:00000002 r7:60000113 r6:ebb71d8c r5:857e6000 r4:857e6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504cd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857acf8c r4:857acc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857acf8c r4:85059c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e6000 r8:85059cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059c80 r8:80287e08 r7:ebb65e60 r6:85059d00 r5:857e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8504c980 INFO: task kworker/0:906:5466 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 962d6000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:907:5468 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:907 state:D stack:0 pid:5468 tgid:5468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb75d84 r8:00000002 r7:60000113 r6:ebb75d8c r5:857e6c00 r4:857e6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504cfc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ad78c r4:857ad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ad78c r4:85059d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e6c00 r8:85059dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059d80 r8:80287e08 r7:ebb65e60 r6:85059e00 r5:857e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8504cd40 INFO: task kworker/0:907:5468 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 962d6000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:908:5470 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:908 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb79d84 r8:00000002 r7:60000013 r6:ebb79d8c r5:857e0000 r4:857e0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:857adb8c r4:857ad800 r7:dddced80 r6:83018000 r5:857adb8c r4:85059e80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8504ce80 INFO: task kworker/0:908:5470 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 966a0000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8494d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb7de08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8494d400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857adf8c r4:857adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857adf8c r4:85059f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8494d400 r8:85059fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85059f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85059f80 r8:80287e08 r7:ebb79e60 r6:8580d000 r5:8494d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb7dfb0 to 0xebb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a1c0 INFO: task kworker/0:909:5472 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 96c06000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:910 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857ae78c r4:857ae400 r7:dddced80 r6:83018000 r5:857ae78c r4:8580d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8580a100 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:911:5476 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:911 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb89d84 r8:00000002 r7:60000013 r6:ebb89d8c r5:844c1800 r4:844c1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb903000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ae38c r4:857ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ae38c r4:8580d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c1800 r8:8580d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8580d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8580d180 r8:80287e08 r7:ebb81e60 r6:8580d200 r5:844c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb89fb0 to 0xebb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a2c0 INFO: task kworker/0:911:5476 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 96c06000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 r4:00000000 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:844c3000 r5:844c3000 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857af38c r4:857af000 r10:61c88647 r9:844c3000 r8:8580d2ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 96f7d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:5480 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb85d84 r8:00000002 r7:60000113 r6:ebb85d8c r5:844c0c00 r4:844c0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb85e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844c0c00 r8:8580d3ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:5482 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb91d84 r8:00000002 r7:60000113 r6:ebb91d8c r5:844c3c00 r4:844c3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb933000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aeb8c r4:857ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aeb8c r4:8580d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c3c00 r8:8580d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8580d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8580d480 r8:80287e08 r7:ebb8de60 r6:8580d500 r5:844c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb91fb0 to 0xebb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a4c0 INFO: task kworker/0:914:5482 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 97640000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:915:5485 blocked for more than 469 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:844c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb941000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aef8c r4:857aec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aef8c r4:8580d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c4800 r8:8580d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8580d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8580d580 r8:80287e08 r7:ebb8de60 r6:8580d600 r5:844c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580aa00 INFO: task kworker/0:915:5485 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 97955000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:5486 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb99d84 r8:00000002 r7:60000113 r6:ebb99d8c r5:844c5400 r4:844c5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577dc80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb971000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857afb8c r4:857af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857afb8c r4:8580d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c5400 r8:8580d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8580d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8580d680 r8:80287e08 r7:ebb8de60 r6:8580d700 r5:844c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb99fb0 to 0xebb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ab00 INFO: task kworker/0:916:5486 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 97955000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:5488 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:917 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba1d84 r8:00000002 r7:60000113 r6:ebba1d8c r5:844c6c00 r4:844c6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ae40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r5:857af78c r4:857af400 r4:8580d780 Exception stack(0xebba1fb0 to 0xebba1ff8) r4:8580acc0 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 97d50000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:5490 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba5d84 r8:00000002 r7:60000113 r6:ebba5d8c r5:856f0000 r4:856f0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r5:857aff8c r4:857afc00 r4:8580d880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:919:5492 blocked for more than 469 seconds. r10:8291a684 r9:ebb9dd84 r8:00000002 r7:60000113 r6:ebb9dd8c r5:856f0c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856f0c00 r8:8580d9ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xebb9dfb0 to 0xebb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8080 INFO: task kworker/0:919:5492 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 97e65000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:920:5494 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:920 state:D stack:0 pid:5494 tgid:5494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:856f1800 r4:856f1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb997000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b838c r4:857b8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b838c r4:8580da80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f1800 r8:8580daac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xebba9fb0 to 0xebba9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8180 INFO: task kworker/0:920:5494 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 981b9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:5495 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:856f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r5:857b8b8c r4:857b8800 r7:dddced80 r6:83018000 r5:857b8b8c r4:8580db80 r10:00000000 r9:8580db80 r8:80287e08 r7:ebb9de60 r6:8580dc00 r5:856f3000 r4:850b8180 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84867140 task:kworker/0:922 state:D stack:0 pid:5498 tgid:5498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b938c r4:857b9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b938c r4:8580dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f3c00 r8:8580dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8580dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8580dc80 r8:80287e08 r7:ebbb1e60 r6:8580dd00 r5:856f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbadfb0 to 0xebbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8580 INFO: task kworker/0:922:5498 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 98950000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:923:5500 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:923 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:856f4800 r4:856f4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b8f8c r4:857b8c00 r7:dddced80 r6:83018000 r5:857b8f8c r4:8580dd80 r4:8580dd80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:850b8600 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b9f8c r4:857b9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b9f8c r4:8580de80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f5400 r8:8580deac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8580de80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8580de80 r8:80287e08 r7:ebbade60 r6:8580df00 r5:856f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbbdfb0 to 0xebbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8880 INFO: task kworker/0:924:5503 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 98aed000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:856f6000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857b978c r4:857b9400 r10:61c88647 r9:856f6000 r8:8580dfac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:926:5506 blocked for more than 469 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:5506 tgid:5506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd5d84 r8:00000002 r7:60000113 r6:ebbd5d8c r5:856f6c00 r4:856f6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b9b8c r4:857b9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b9b8c r4:8505c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f6c00 r8:8505c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505c080 r8:80287e08 r7:ebbbde60 r6:8505c100 r5:856f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd5fb0 to 0xebbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8b40 INFO: task kworker/0:926:5506 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 99062000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857ba38c r4:857ba000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ba38c r4:8505c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f2400 r8:8505c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505c180 r8:80287e08 r7:ebbbde60 r6:8505c200 r5:856f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe1fb0 to 0xebbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8c40 INFO: task kworker/0:927:5508 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 99266000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:5510 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857ba78c r4:8505c280 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:857f8000 r4:00000000 r4:00000000 r5:857bab8c r4:857ba800 r7:dddced80 r6:83018000 r5:857bab8c r4:8505c380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 994f0000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:5514 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:5514 tgid:5514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba71d84 r8:00000002 r7:60000013 r6:eba71d8c r5:857f8c00 r4:857f8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a76c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857bbb8c r4:857bb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bbb8c r4:8505c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:931:5517 blocked for more than 469 seconds. r4:857f9800 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857baf8c r4:857bac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857baf8c r4:8505c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f9800 r8:8505c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505c580 r8:80287e08 r7:eba71e60 r6:8505c600 r5:857f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba59fb0 to 0xeba59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a70c0 INFO: task kworker/0:931:5517 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 99a8c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:857fa400 r8:8505c6ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeba7dfb0 to 0xeba7dff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857bb78c r4:857bb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bb78c r4:8505c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fb000 r8:8505c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505c780 r8:80287e08 r7:eba71e60 r6:8505c800 r5:857fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba89fb0 to 0xeba89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7400 INFO: task kworker/0:933:5521 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 99e30000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:5523 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa9d84 r8:00000002 r7:60000113 r6:ebaa9d8c r5:857fc800 r4:857fc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857bbf8c r4:857bbc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebaa9fb0 to 0xebaa9ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:5525 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ebab5d84 r8:00000002 r7:60000013 r6:ebab5d8c r5:857fbc00 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8505c980 Exception stack(0xebab5fb0 to 0xebab5ff8) r4:850a77c0 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:936 state:D stack:0 pid:5527 tgid:5527 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8505ca80 Exception stack(0xebac1fb0 to 0xebac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a79c0 INFO: task kworker/0:936:5527 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9a41c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:5528 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:5528 tgid:5528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000013 r6:ebacdd8c r5:857fd400 r4:857fd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c938c r4:857c9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c938c r4:8505cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fd400 r8:8505cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505cb80 r8:80287e08 r7:ebac1e60 r6:8505cc00 r5:857fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebacdfb0 to 0xebacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a79c0 INFO: task kworker/0:937:5528 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 9a41c000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r5:00001000 r4:e0053000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:857fe000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8505cc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:5534 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:5534 tgid:5534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebafdd84 r8:00000002 r7:60000113 r6:ebafdd8c r5:856ed400 r4:856ed400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ed400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebafde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85847100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a79f8c r4:84a79c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a79f8c r4:84abfd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ed400 r8:84abfd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84abfd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abfd00 r8:80287e08 r7:eb805e60 r6:84abfd80 r5:856ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebafdfb0 to 0xebafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506ec40 INFO: task kworker/1:258:5534 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9aab1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:5535 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb09d84 r8:00000002 r7:60000113 r6:ebb09d8c r5:856e8c00 r4:856e8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:857c978c r4:857c9400 r10:61c88647 r9:856e8c00 r8:8505ce2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9aab1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:940:5537 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb50d000 r5:857c9b8c r4:857c9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8505ce80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850951c0 INFO: task kworker/0:940:5537 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ae37000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856ec800 r8:8505cf2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 9ae37000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:857cab8c r4:857ca800 r4:8505cf80 Exception stack(0xebbedfb0 to 0xebbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85095300 INFO: task kworker/0:942:5540 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9affe000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:943:5542 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:943 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebc19d84 r8:00000002 r7:60000013 r6:ebc19d8c r5:856ebc00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857ca38c r4:857ca000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 9affe000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:856eb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebc21fb0 to 0xebc21ff8) Workqueue: events bpf_prog_free_deferred dd20: 9b1d3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:5546 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc29d84 r8:00000002 r7:60000013 r6:ebc29d8c r5:856e9800 r4:856e9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba61000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cbb8c r4:857cb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cbb8c r4:8505f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e9800 r8:8505f0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f080 r8:80287e08 r7:ebbede60 r6:85842080 r5:856e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85095940 INFO: task kworker/0:945:5546 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: 9b51b000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r5:00001000 r4:e0053000 r4:84864380 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:946:5549 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:946 state:D stack:0 pid:5549 tgid:5549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc2dd84 r8:00000002 r7:60000013 r6:ebc2dd8c r5:856ea400 r4:856ea400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ea400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857caf8c r4:857cac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8505f100 r8:80287e08 r7:ebc29e60 r6:85842100 r5:856ea400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 9b87f000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r5:00001000 r4:e0053000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85842180 Exception stack(0xebc35fb0 to 0xebc35ff8) r4:858470c0 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cb38c r4:857cb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cb38c r4:8505f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c6000 r8:8505f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f180 r8:80287e08 r7:ebc29e60 r6:85842280 r5:844c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85095c80 INFO: task kworker/0:947:5552 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9bb05000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08 r9:83018205 r8:848f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d80 r6:83018200 r5:8582838c r4:85842300 r10:00000000 r9:85842300 r8:80287e08 r7:eb805e60 r6:85842380 r5:848f8c00 r4:85847300 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9bf0f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:948:5557 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:948 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc51d84 r8:00000002 r7:60000113 r6:ebc51d8c r5:848f8000 r4:848f8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8585438c r4:85854000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85095d40 INFO: task kworker/0:949:5558 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9c42c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:950:5562 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:950 state:D stack:0 pid:5562 tgid:5562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:848fc800 r4:848fc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a79c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585478c r4:85854400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585478c r4:8505f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fc800 r8:8505f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f300 r8:80287e08 r7:ebc51e60 r6:85842500 r5:848fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:848fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r7:dddced80 r6:83018000 r5:85854b8c r4:8505f380 Exception stack(0xebc65fb0 to 0xebc65ff8) r4:8584a000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9c7dd000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:952:5565 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:952 state:D stack:0 pid:5565 tgid:5565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc6dd84 r8:00000002 r7:60000013 r6:ebc6dd8c r5:848fbc00 r4:848fbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc6de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8585578c r4:85855400 r4:8505f400 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85854f8c r4:85854c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85854f8c r4:8505f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fec00 r8:8505f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f480 r8:80287e08 r7:ebc6de60 r6:85842680 r5:848fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8584a200 INFO: task kworker/0:953:5567 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ccc3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r5:800f0013 r4:80239bb0 r4:00000000 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:954:5568 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:954 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc85d84 r8:00000002 r7:60000013 r6:ebc85d8c r5:848fe000 r4:848fe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585538c r4:85855000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585538c r4:8505f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fe000 r8:8505f52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f500 r8:80287e08 r7:ebc6de60 r6:85842700 r5:848fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd20: 9ccc3000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:85855b8c r4:85855800 r10:61c88647 r9:848fb000 r8:8505f5ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 9cedb000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:5574 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc71d84 r8:00000002 r7:60000113 r6:ebc71d8c r5:848f9800 r4:848f9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858477c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7978c r4:84a79400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7978c r4:85842800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f9800 r8:8584282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85842800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85842800 r8:80287e08 r7:ebc49e60 r6:85842880 r5:848f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc71fb0 to 0xebc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85847a40 INFO: task kworker/1:261:5574 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9d182000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:84864380 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85855f8c r4:85855c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8585638c r4:85856000 r4:8505f680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r5:800f0013 r4:80239bb0 r4:dfa0ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:5581 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:958 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcbdd84 r8:00000002 r7:60000013 r6:ebcbdd8c r5:85858c00 r4:85858c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85858c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584ac00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85858c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585678c r4:85856400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585678c r4:8505f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85858c00 r8:8505f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f700 r8:80287e08 r7:ebb45e60 r6:85842a00 r5:85858c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcbdfb0 to 0xebcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8584a9c0 INFO: task kworker/0:958:5581 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9d3b2000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:5582 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:5582 tgid:5582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcc1d84 r8:00000002 r7:60000113 r6:ebcc1d8c r5:85859800 r4:85859800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85859800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:85856b8c r4:85856800 r7:dddced80 r6:83018000 r5:85856b8c r4:8505f780 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85856f8c r4:85856c00 r10:61c88647 r9:8585a400 r8:8505f82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:961:5586 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:5586 tgid:5586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcc9d84 r8:00000002 r7:60000013 r6:ebcc9d8c r5:8585b000 r4:8585b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584afc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8585b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585738c r4:85857000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585738c r4:8505f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585b000 r8:8505f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f880 r8:80287e08 r7:ebcc5e60 r6:85842b80 r5:8585b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc9fb0 to 0xebcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8584ac80 INFO: task kworker/0:961:5586 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9d9c1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/0:962 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 r5:00001000 r4:eb267000 r5:8585778c r4:85857400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585778c r4:8505f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585bc00 r8:8505f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f900 r8:80287e08 r7:ebcc9e60 r6:85842c00 r5:8585bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebccdfb0 to 0xebccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8584ae40 INFO: task kworker/0:962:5588 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9dd40000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8505f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505f980 r8:80287e08 r7:ebccde60 r6:8505fa00 r5:84579800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad9fb0 to 0xebad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850958c0 INFO: task kworker/0:963:5590 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9dfdf000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8457a400 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85857b8c r4:85857800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85857b8c r4:8505fa80 r10:61c88647 r9:8457a400 r8:8505faac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8505fb80 r10:00000000 r9:8505fb80 r8:80287e08 r7:ebad9e60 r6:8505fc00 r5:8457c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd1fb0 to 0xebcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858482c0 INFO: task kworker/0:965:5595 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9e47b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:966 state:D stack:0 pid:5596 tgid:5596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85848500 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8505fc80 dfa0: 00000000 00000000 00000000 00000000 Call trace: r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:967 state:D stack:0 pid:5598 tgid:5598 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85890b8c r4:85890800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85890b8c r4:8505fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457bc00 r8:8505fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505fd80 r8:80287e08 r7:ebcdde60 r6:8505fe00 r5:8457bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce1fb0 to 0xebce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85848180 INFO: task kworker/0:967:5598 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ea66000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85890f8c r4:8505fe80 r4:8505fe80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ea66000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:969:5602 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:969 state:D stack:0 pid:5602 tgid:5602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebce5d84 r8:00000002 r7:60000013 r6:ebce5d8c r5:8457d400 r4:8457d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85848bc0 r9:83018005 r8:8457d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r7:dddced80 r6:83018000 r5:8589138c r4:8505ff80 r4:8505ff80 Exception stack(0xebce5fb0 to 0xebce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85848700 INFO: task kworker/0:969:5602 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ebe5000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:970:5605 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:970 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcedd84 r8:00000002 r7:60000013 r6:ebcedd8c r5:84578000 r4:84578000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84578000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85848d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84578000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589178c r4:85891400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589178c r4:85902080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84578000 r8:859020ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902080 r8:80287e08 r7:ebce5e60 r6:85902100 r5:84578000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85848a40 INFO: task kworker/0:970:5605 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84578c00 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb8f9000 r10:61c88647 r9:84578c00 r8:859021ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85848b80 INFO: task kworker/0:971:5607 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ee1d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:262:5608 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:262 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:84b60000 r4:84b60000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b60000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85851f40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b60000 r8:85842cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xebcf5fb0 to 0xebcf5ff8) INFO: task kworker/1:262:5608 is blocked on a mutex likely owned by task kworker/1:7:3126. dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84b60c00 r4:8291a680 r4:00000000 r4:00000000 r5:85891b8c r4:85891800 r7:dddced80 r6:83018000 r5:85891b8c r4:85902300 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85848c80 INFO: task kworker/0:972:5610 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9f1ac000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:973:5611 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:973 state:D stack:0 pid:5611 tgid:5611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec505d84 r8:00000002 r7:60000113 r6:ec505d8c r5:84b61800 r4:84b61800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b61800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 9f46d000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/0:974:5615 blocked for more than 470 seconds. r4:8585d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec525e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85901280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8585d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589278c r4:85892400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589278c r4:85902500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585d400 r8:8590252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902500 r8:80287e08 r7:ebce9e60 r6:85842d00 r5:8585d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec525fb0 to 0xec525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859011c0 INFO: task kworker/0:974:5615 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9f860000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:975:5616 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:975 state:D stack:0 pid:5616 tgid:5616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec529d84 r8:00000002 r7:60000013 r6:ec529d8c r5:8585c800 r4:8585c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec529e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8585c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec529fb0 to 0xec529ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:976:5617 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:976 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec52dd84 r8:00000002 r7:60000113 r6:ec52dd8c r5:8585ec00 r4:8585ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec52de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85901400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8585ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb927000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85892b8c r4:85892800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85892b8c r4:85902600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585ec00 r8:8590262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902600 r8:80287e08 r7:ec529e60 r6:85842e00 r5:8585ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec52dfb0 to 0xec52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85901340 INFO: task kworker/0:976:5617 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:8585e000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85902680 r4:00000001 INFO: task kworker/0:977:5620 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ffd6000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:978:5621 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:978 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec535d84 r8:00000002 r7:60000113 r6:ec535d8c r5:8457b000 r4:8457b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859018c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457b000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb97b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589378c r4:85893400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589378c r4:85902700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457b000 r8:8590272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902700 r8:80287e08 r7:ec531e60 r6:85842f00 r5:8457b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec535fb0 to 0xec535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85901580 INFO: task kworker/0:978:5621 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: 9ffd6000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85893f8c r4:85893c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85893f8c r4:85902780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85860000 r8:859027ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902780 r8:80287e08 r7:ec535e60 r6:85842f80 r5:85860000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec539fb0 to 0xec539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859013c0 INFO: task kworker/0:979:5623 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a022a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85860c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85893b8c r4:85902800 r4:85902800 r10:00000000 r9:85902800 r8:80287e08 r7:ec539e60 r6:8590a000 r5:85860c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:5627 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec53dd84 r8:00000002 r7:60000113 r6:ec53dd8c r5:85861800 r4:85861800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85861800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec53de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85911f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85861800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a7b8c r4:858a7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a7b8c r4:8590a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85861800 r8:8590a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8590a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8590a080 r8:80287e08 r7:ebc49e60 r6:8590a100 r5:85861800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec53dfb0 to 0xec53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85851ec0 INFO: task kworker/1:263:5627 is blocked on a mutex likely owned by task kworker/1:7:3126. Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:981:5629 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:981 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec541d84 r8:00000002 r7:60000113 r6:ec541d8c r5:85862400 r4:85862400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85862400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec541e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85901d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85862400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589c78c r4:8589c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589c78c r4:85902880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85862400 r8:859028ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902880 r8:80287e08 r7:ec539e60 r6:8590a180 r5:85862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec541fb0 to 0xec541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85901900 INFO: task kworker/0:981:5629 is blocked on a mutex likely owned by task kworker/1:7:3126. Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0053000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec545d84 r8:00000002 r7:60000113 r6:ec545d8c r5:85863000 r4:85863000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85863000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec545e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85901c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85863000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589c38c r4:8589c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589c38c r4:85902900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85863000 r8:8590292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902900 r8:80287e08 r7:ec541e60 r6:8590a200 r5:85863000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec545fb0 to 0xec545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85901b00 INFO: task kworker/0:982:5631 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a091e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:983:5635 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85863c00 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85902980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902980 r8:80287e08 r7:ec541e60 r6:8590a280 r5:85863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec555fb0 to 0xec555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85901c00 INFO: task kworker/0:983:5635 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a091e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:984:5636 blocked for more than 471 seconds. r4:85866000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec559e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85902a00 r8:80287e08 r7:ec555e60 r6:8590a300 r5:85866000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Call trace: r10:8291a684 r9:ec561d84 r8:00000002 r7:60000013 r6:ec561d8c r5:85866c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec561e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebcb9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589d78c r4:8589d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589d78c r4:85902a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85866c00 r8:85902aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902a80 r8:80287e08 r7:ec559e60 r6:8590a380 r5:85866c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec561fb0 to 0xec561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85901e00 INFO: task kworker/0:985:5638 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a0dce000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:986:5639 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:986 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec511d84 r8:00000002 r7:60000113 r6:ec511d8c r5:84b63000 r4:84b63000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b63000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85851300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ebbcf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589d38c r4:85902b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b63000 r8:85902b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902b00 r8:80287e08 r7:ec561e60 r6:85902b80 r5:84b63000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec511fb0 to 0xec511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85851640 INFO: task kworker/0:986:5639 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a0ebd000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:987 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85902c00 r8:80287e08 r7:ec561e60 r6:85902c80 r5:84b63c00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Call trace: r5:84b64800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8589db8c r4:8589d800 r7:dddced80 r6:83018000 r5:8589db8c r4:85902d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b64800 r8:85902d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85902d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85902d00 r8:80287e08 r7:ec55de60 r6:85902d80 r5:84b64800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec569fb0 to 0xec569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859111c0 INFO: task kworker/0:988:5643 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a119c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:989:5646 blocked for more than 471 seconds. r5:84b65400 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8589df8c r4:8589dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:e0053000 r4:84864380 r4:00000001 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:991:5651 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:991 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec58dd84 r8:00000002 r7:60000113 r6:ec58dd8c r5:84b66c00 r4:84b66c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b66c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85911740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec58f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589e78c r4:8589e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589e78c r4:8591d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b66c00 r8:8591d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591d000 r8:80287e08 r7:ec581e60 r6:8591d080 r5:84b66c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859115c0 INFO: task kworker/0:991:5651 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a1466000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589f38c r4:8591d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b62400 r8:8591d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591d100 r8:80287e08 r7:ec581e60 r6:8591d180 r5:84b62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec599fb0 to 0xec599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859116c0 INFO: task kworker/0:992:5652 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a1a47000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec509e08 r9:83018005 r8:84888000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a1a47000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84888c00 r8:8591d32c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8591d400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a1eb5000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:996:5660 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:996 state:D stack:0 pid:5660 tgid:5660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5cdd84 r8:00000002 r7:60000113 r6:ec5cdd8c r5:8488a400 r4:8488a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488a400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8589fb8c r4:8591d500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8488b000 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:8488b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a438c r4:858a4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a438c r4:8591d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8488b000 r8:8591d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591d600 r8:80287e08 r7:ec5a5e60 r6:8591d680 r5:8488b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d9fb0 to 0xec5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592a080 INFO: task kworker/0:997:5663 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a22b2000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 r4:84867140 task:kworker/0:998 state:D stack:0 pid:5664 tgid:5664 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:999:5667 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:999 state:D stack:0 pid:5667 tgid:5667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:8488c800 r4:8488c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592a880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8488c800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a538c r4:858a5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a538c r4:8591d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8488c800 r8:8591d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591d800 r8:80287e08 r7:ec5e9e60 r6:8591d880 r5:8488c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec601fb0 to 0xec601ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/0:1000:5668 blocked for more than 471 seconds. r10:8291a684 r9:ec60dd84 r8:00000002 r7:60000113 r6:ec60dd8c r5:8488d400 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8591d900 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592a680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85868000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec62d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a4f8c r4:858a4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a4f8c r4:8591da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85868000 r8:8591da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591da00 r8:80287e08 r7:ec601e60 r6:8590a400 r5:85868000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae5fb0 to 0xebae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592a500 INFO: task kworker/0:1001:5670 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a2bea000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84867140 Workqueue: events bpf_prog_free_deferred r5:85868c00 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e0423000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:8586bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592aec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a678c r4:858a6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a678c r4:8591db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586bc00 r8:8591db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591db00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591db00 r8:80287e08 r7:ebaf1e60 r6:8590a500 r5:8586bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592a7c0 INFO: task kworker/0:1003:5674 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a2bea000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8586d400 r8:8591dbac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a321f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec649d84 r8:00000002 r7:60000113 r6:ec649d8c r5:8586b000 r4:8586b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8586b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8591dc00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8586c800 r4:00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb093000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a638c r4:858a6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a638c r4:8591dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586c800 r8:8591dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591dc80 r8:80287e08 r7:ec63de60 r6:8590a680 r5:8586c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec655fb0 to 0xec655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592ac80 INFO: task kworker/0:1006:5680 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a354b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:5682 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:5682 tgid:5682 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:8586a400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8591dd00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec665d84 r8:00000002 r7:60000013 r6:ec665d8c r5:8586ec00 r4:8586ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592af80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a6b8c r4:858a6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a6b8c r4:8591dd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586ec00 r8:8591ddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591dd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591dd80 r8:80287e08 r7:ec65de60 r6:8590a780 r5:8586ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85910bc0 INFO: task kworker/0:1008:5684 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:1009 state:D stack:0 pid:5685 tgid:5685 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec669e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858a738c r4:8591de00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a3bef000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85864800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r7:dddced80 r6:83018000 r5:858a778c r4:8591de80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586e000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb535000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a838c r4:858a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a838c r4:8591df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586e000 r8:8591df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591df00 r8:80287e08 r7:ec66de60 r6:8590a900 r5:8586e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85910bc0 INFO: task kworker/0:1011:5691 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a3e0f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8591df80 Exception stack(0xec679fb0 to 0xec679ff8) r4:85910bc0 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85871800 r4:8291a680 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8590aa00 Exception stack(0xec67dfb0 to 0xec67dff8) r4:852d4640 INFO: task kworker/1:264:5694 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a4494000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1013:5696 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1013 state:D stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec685d84 r8:00000002 r7:60000013 r6:ec685d8c r5:85870c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284400 r10:61c88647 r9:85870c00 r8:8528602c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r5:800f0013 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/0:1014:5698 blocked for more than 471 seconds. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284540 r10:61c88647 r9:85872400 r8:852860ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85286080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85286080 r8:80287e08 r7:ec685e60 r6:8590ab80 r5:85872400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85284100 INFO: task kworker/0:1014:5698 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a4811000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1015:5700 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1015 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85873000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85873000 r8:8528612c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:5702 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85873c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85873c00 r8:852861ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85286180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85286180 r8:80287e08 r7:ec695e60 r6:8590ac80 r5:85873c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec69dfb0 to 0xec69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852845c0 INFO: task kworker/0:1016:5702 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a49fc000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: a4d42000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:5706 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6b5d84 r8:00000002 r7:60000013 r6:ec6b5d8c r5:85875400 r4:85875400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85875400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85875400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a978c r4:858a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a978c r4:85286280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85875400 r8:852862ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r5:00001000 r4:ebb11000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:858e0000 r8:8528632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85286300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85286300 r8:80287e08 r7:ec695e60 r6:85286380 r5:858e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b1fb0 to 0xec5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85284880 INFO: task kworker/0:1019:5709 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a4fad000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6d9d84 r8:00000002 r7:60000113 r6:ec6d9d8c r5:858e1800 r4:858e1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8582878c r4:8590ae00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:5713 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:5713 tgid:5713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6fdd84 r8:00000002 r7:60000113 r6:ec6fdd8c r5:858e3000 r4:858e3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6fde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: a55f7000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85876c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r7:ddde2d80 r6:83018200 r5:85828b8c r4:8590af00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1020:5717 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1020 state:D stack:0 pid:5717 tgid:5717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec701d84 r8:00000002 r7:60000013 r6:ec701d8c r5:85865400 r4:85865400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85865400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85865400 r8:8528652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85286500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85286500 r8:80287e08 r7:ec695e60 r6:850e2000 r5:85865400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85284d40 INFO: task kworker/0:1020:5717 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a55f7000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dfa0ddc0 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:858aa78c r4:858aa400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:800f0013 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1022:5721 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1022 state:D stack:0 pid:5721 tgid:5721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f9d84 r8:00000002 r7:60000013 r6:ec6f9d8c r5:85879800 r4:85879800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85879800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85879800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858aab8c r4:858aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858aab8c r4:85286600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85879800 r8:8528662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85286600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85286600 r8:80287e08 r7:ec709e60 r6:850e2100 r5:85879800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f9fb0 to 0xec6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85284b80 INFO: task kworker/0:1022:5721 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec711e08 r5:00001000 r4:ebc7b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:5725 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec715d84 r8:00000002 r7:60000113 r6:ec715d8c r5:8587bc00 r4:8587bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8587bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8587bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582938c r4:85829000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582938c r4:850e2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587bc00 r8:850e222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e2200 r8:80287e08 r7:ec6fde60 r6:850e2280 r5:8587bc00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: a6269000 eb0cd000 00000001 80239b98 7f13f000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8582978c r4:85829400 r4:00000001 Call trace: [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85829b8c r4:85829800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85829b8c r4:850e2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587ec00 r8:850e252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e2500 r8:80287e08 r7:ec6fde60 r6:850e2580 r5:8587ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d5fb0 to 0xec5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d0200 INFO: task kworker/1:270:5759 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a66bf000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:00001000 r4:e0053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ec5e1d84 r8:00000002 r7:60000113 r6:ec5e1d8c r5:8587e000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:84864380 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec609e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582a78c r4:8582a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582a78c r4:850e2700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85876000 r8:850e272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e2700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e2700 r8:80287e08 r7:ec5e1e60 r6:850e2780 r5:85876000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec609fb0 to 0xec609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d0940 INFO: task kworker/1:272:5771 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a6ace000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:273 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850e2800 r8:80287e08 r7:ec5e1e60 r6:850e2880 r5:85878000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:5780 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec749d84 r8:00000002 r7:60000113 r6:ec749d8c r5:85880000 r4:85880000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85880000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec749e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84597180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85880000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582af8c r4:8582ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582af8c r4:850e2900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85880000 r8:850e292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e2900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e2900 r8:80287e08 r7:ec5e1e60 r6:850e2980 r5:85880000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec749fb0 to 0xec749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:275 state:D stack:0 pid:5787 tgid:5787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850e2a00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a6fa5000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:5887 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:5887 tgid:5887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec815d84 r8:00000002 r7:60000113 r6:ec815d8c r5:85886000 r4:85886000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850e2b00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: a7787000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec593000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7bb8c r4:84a7b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7bb8c r4:850e2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85886c00 r8:850e2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e2c00 r8:80287e08 r7:ec5e1e60 r6:850e2c80 r5:85886c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec729fb0 to 0xec729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd200 INFO: task kworker/1:277:5890 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a79a9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 dfa0: 00000000 00000000 00000000 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850e2d00 Exception stack(0xec731fb0 to 0xec731ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 r4:85883000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec741e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85883000 r7:00000000 r6:83018200 r5:00001000 r4:7f147000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7af8c r4:84a7ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7af8c r4:850e2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85883000 r8:850e2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e2e00 r8:80287e08 r7:ec731e60 r6:850e2e80 r5:85883000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec741fb0 to 0xec741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd5c0 INFO: task kworker/1:279:5894 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a7d97000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:5896 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec745d84 r8:00000002 r7:60000113 r6:ec745d8c r5:85884800 r4:85884800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85884800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec745e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dda80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85884800 r7:00000000 r6:83018200 r5:00001000 r4:7f149000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec70b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583438c r4:85834000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583438c r4:850e2f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85884800 r8:850e2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e2f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e2f00 r8:80287e08 r7:ec741e60 r6:850e2f80 r5:85884800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec745fb0 to 0xec745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd640 INFO: task kworker/1:280:5896 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a7d97000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:5897 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:5897 tgid:5897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5fdd84 r8:00000002 r7:60000013 r6:ec5fdd8c r5:85883c00 r4:85883c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85883c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ddc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec733000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583478c r4:85834400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583478c r4:85958000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85883c00 r8:8595802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85958000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85958000 r8:80287e08 r7:ec745e60 r6:85958080 r5:85883c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5fdfb0 to 0xec5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd640 INFO: task kworker/1:281:5897 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0053000 r4:84864380 r4:00000001 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dde00 r5:00001000 r4:ec75b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85958100 r8:80287e08 r7:ec5fde60 r6:85958180 r5:85888000 r4:853dda00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a89dc000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:5901 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec765d84 r8:00000002 r7:60000013 r6:ec765d8c r5:858e5400 r4:858e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ddf40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f14f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec767000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85834f8c r4:85834c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85834f8c r4:85958200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e5400 r8:8595822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85958200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85958200 r8:80287e08 r7:ec759e60 r6:85286800 r5:858e5400 Exception stack(0xec765fb0 to 0xec765ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8583578c r4:85958280 r10:61c88647 r9:858e6000 r8:859582ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a89dc000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:5906 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:5906 tgid:5906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec785d84 r8:00000002 r7:60000013 r6:ec785d8c r5:858e3c00 r4:858e3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f151000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec773000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583538c r4:85835000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583538c r4:85958300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e3c00 r8:8595832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85958300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85958300 r8:80287e08 r7:ec771e60 r6:85286900 r5:858e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec785fb0 to 0xec785ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:5908 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:5908 tgid:5908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec789d84 r8:00000002 r7:60000113 r6:ec789d8c r5:858e0c00 r4:858e0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85955380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f155000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85835b8c r4:85835800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85835b8c r4:85958380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e0c00 r8:859583ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85958380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85958380 r8:80287e08 r7:ec771e60 r6:85286980 r5:858e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85955140 INFO: task kworker/1:286:5908 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a906e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:287:5910 blocked for more than 472 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85955c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85888c00 r7:00000000 r6:83018200 r5:00001000 r4:7f163000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec861000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85836b8c r4:85836800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85836b8c r4:85958400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85888c00 r8:8595842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85958400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85958400 r8:80287e08 r7:ec789e60 r6:85958480 r5:85888c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec795fb0 to 0xec795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r5:00001000 r4:e0053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85835f8c r4:85958500 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec831fb0 to 0xec831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859554c0 INFO: task kworker/1:288:5912 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: a950b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:289:5917 blocked for more than 472 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85958600 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:5920 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec82dd84 r8:00000002 r7:60000013 r6:ec82dd8c r5:8588bc00 r4:8588bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85955b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8588bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f161000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec855000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583678c r4:85836400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583678c r4:85958700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588bc00 r8:8595872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85958700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85958700 r8:80287e08 r7:ec795e60 r6:85958780 r5:8588bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:291:5923 blocked for more than 472 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85955dc0 r5:00001000 r4:ec86d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:5926 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:5926 tgid:5926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec871d84 r8:00000002 r7:60000113 r6:ec871d8c r5:8588d400 r4:8588d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85955f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8588d400 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec889000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583738c r4:85837000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583738c r4:85958900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588d400 r8:8595892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec871fb0 to 0xec871ff8) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r5:00001000 r4:ec891000 r4:85958a00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: aa3bc000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8588ec00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b500 r5:8583c38c r4:8583c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583c38c r4:85958b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588ec00 r8:85958b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85958b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85958b00 r8:80287e08 r7:ec881e60 r6:85958b80 r5:8588ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85955f00 INFO: task kworker/1:294:5930 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: aa3bc000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:295:5931 blocked for more than 472 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85958c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: aa9a0000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:84867140 task:kworker/1:296 state:D stack:0 pid:5936 tgid:5936 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b680 r5:8583c78c r4:8583c400 r10:61c88647 r9:85368000 r8:85958d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:5938 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d1d84 r8:00000002 r7:600d0113 r6:ec8d1d8c r5:85369800 r4:85369800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85369800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b940 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84867140 r4:8536bc00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:5942 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e9d84 r8:00000002 r7:600b0113 r6:ec8e9d8c r5:85368c00 r4:85368c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85368c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0053000 r4:84864380 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:300:5944 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:5944 tgid:5944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8b9d84 r8:00000002 r7:60000013 r6:ec8b9d8c r5:8536c800 r4:8536c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594be80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8536c800 r7:00000000 r6:83018200 r5:00001000 r4:7f17d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583d78c r4:8583d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583d78c r4:85949100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85949100 r8:80287e08 r7:ec8e9e60 r6:85949180 r5:8536c800 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000001 INFO: task kworker/1:301:5949 blocked for more than 472 seconds. r4:00000000 r5:00001000 r4:ec901000 r10:61c88647 r9:8536ec00 r8:8594922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85880c00 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dddc0 r5:00001000 r4:ec909000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583df8c r4:8583dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583df8c r4:85949300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85880c00 r8:8594932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85949300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85949300 r8:80287e08 r7:ec915e60 r6:85949380 r5:85880c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a5f740 INFO: task kworker/1:302:5952 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: abd54000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:8536a400 r8:8594942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:5956 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e5d84 r8:00000002 r7:60010013 r6:ec8e5d8c r5:858e4800 r4:858e4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594c700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f18b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec8e5fb0 to 0xec8e5ff8) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 r4:84867140 r5:858e6c00 r4:8291a680 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:00000000 r9:85949580 r8:80287e08 r7:ec92de60 r6:85286a80 r5:858e6c00 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:5965 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:5965 tgid:5965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:848a8000 r4:848a8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594ce00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f199000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583fb8c r4:8583f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8583fb8c r4:85949600 r10:61c88647 r9:848a8000 r8:8594962c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: r5:800f0013 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84867140 r4:848a8c00 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85949680 r8:80287e08 r7:ec985e60 r6:85286b80 r5:848a8c00 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:5967 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:5967 tgid:5967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec995d84 r8:00000002 r7:60000113 r6:ec995d8c r5:848a9800 r4:848a9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594cb80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85949700 r8:80287e08 r7:ec985e60 r6:85286c00 r5:848a9800 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: accd4000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:5969 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:5969 tgid:5969 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ec99dd84 r8:00000002 r7:60000113 r6:ec99dd8c r5:848ab000 r4:848ab000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ab000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594ccc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f197000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec991000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85949780 r8:80287e08 r7:ec985e60 r6:85286c80 r5:848ab000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:310 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:ec9b1000 r7:ddde2d80 r6:83018200 r5:8583ff8c r4:85949800 r10:00000000 r9:85949800 r8:80287e08 r7:ec985e60 r6:85286d00 r5:848aa400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8594cb40 INFO: task kworker/1:310:5972 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ad664000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:5974 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:5974 tgid:5974 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848ac800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85593840 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85949880 r8:80287e08 r7:ec9b9e60 r6:85286d80 r5:848ac800 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594c640 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8594cd80 INFO: task kworker/1:312:5976 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: adb90000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85949980 r8:80287e08 r7:ec9d1e60 r6:85949a00 r5:8536e000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8536d400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8536d400 r8:85949aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85949a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85949a80 r8:80287e08 r7:ec9d1e60 r6:85949b00 r5:8536d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d5fb0 to 0xec9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8594bdc0 INFO: task kworker/1:314:5981 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ae015000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:8536b000 r8:85949bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ae4c3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85949c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8594bdc0 INFO: task kworker/1:316:5983 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ae4c3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/1:317 state:D stack:0 pid:5985 tgid:5985 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r5:00001000 r4:eca05000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85949d80 r8:80287e08 r7:ec9f1e60 r6:85949e00 r5:85988000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:318:5989 blocked for more than 472 seconds. r5:85988c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca15e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593c580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85988c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85495f8c r4:85495c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85495f8c r4:85949e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85988c00 r8:85949eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85949e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85949e80 r8:80287e08 r7:ec9f1e60 r6:85949f00 r5:85988c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca15fb0 to 0xeca15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8593c240 INFO: task kworker/1:318:5989 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: aed32000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:85989800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85949f80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:320 state:D stack:0 pid:5992 tgid:5992 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:851b0080 r8:80287e08 r7:eca2de60 r6:851b0100 r5:8598b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8593c680 INFO: task kworker/1:320:5992 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: af28a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:5994 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:8598c800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8598d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r5:00001000 r4:eca41000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85496b8c r4:851b0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598d400 r8:851b02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0280 r8:80287e08 r7:eca45e60 r6:851b0300 r5:8598d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8593c6c0 INFO: task kworker/1:322:5996 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: af5ae000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8549738c r4:851b0380 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:324 state:D stack:0 pid:6000 tgid:6000 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca69e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:851b0480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0480 r8:80287e08 r7:eca5de60 r6:851b0500 r5:8598bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca69fb0 to 0xeca69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8593c840 INFO: task kworker/1:324:6000 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: afa2d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85990000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c0580 r4:851b0580 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:326:6006 blocked for more than 473 seconds. r5:85991800 r4:8291a680 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c0b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85991800 r7:00000000 r6:83018200 r5:00001000 r4:7f1c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85350b8c r4:85350800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85350b8c r4:851b0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85991800 r8:851b06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b0680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0680 r8:80287e08 r7:eca79e60 r6:851b0700 r5:85991800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca81fb0 to 0xeca81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851c0280 INFO: task kworker/1:326:6006 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:327:6009 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:6009 tgid:6009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca7dd84 r8:00000002 r7:60000113 r6:eca7dd8c r5:85992400 r4:85992400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85992400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c0780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85992400 r7:00000000 r6:83018200 r5:00001000 r4:7f1bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85497f8c r4:851b0780 r4:851b0780 Exception stack(0xeca7dfb0 to 0xeca7dff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85993000 r8:851b08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0880 r8:80287e08 r7:eca81e60 r6:851b0900 r5:85993000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca09fb0 to 0xeca09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851c0600 INFO: task kworker/1:328:6010 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b058e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:6012 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca75d84 r8:00000002 r7:60000113 r6:eca75d8c r5:85993c00 r4:85993c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85993c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851b0980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b058e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85994800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca85e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c0d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85994800 r7:00000000 r6:83018200 r5:00001000 r4:7f1c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb817000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85350f8c r4:85350c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85350f8c r4:851b0a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85994800 r8:851b0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b0a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0a80 r8:80287e08 r7:eca81e60 r6:851b0b00 r5:85994800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca85fb0 to 0xeca85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851c0980 INFO: task kworker/1:330:6014 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b089b000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeca89fb0 to 0xeca89ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:332:6018 blocked for more than 473 seconds. r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:851b0c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0c80 r8:80287e08 r7:eca89e60 r6:851b0d00 r5:85996000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851c0d80 INFO: task kworker/1:332:6018 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b1279000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:333:6020 blocked for more than 473 seconds. [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:851b0d80 r4:850bb080 INFO: task kworker/1:333:6020 is blocked on a mutex likely owned by task kworker/1:7:3126. Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:6022 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:6022 tgid:6022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca95d84 r8:00000002 r7:60000113 r6:eca95d8c r5:85990c00 r4:85990c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85990c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca95e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85990c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851b0e80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca99e08 r5:00001000 r4:ebc25000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba85000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb3c0 INFO: task kworker/1:336:6025 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b179e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:6029 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:6029 tgid:6029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaa5d84 r8:00000002 r7:60000113 r6:ecaa5d8c r5:848ad400 r4:848ad400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ad400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848ad400 r8:850c31ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: b21ad000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:6033 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:6033 tgid:6033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecab1d84 r8:00000002 r7:60000113 r6:ecab1d8c r5:848aec00 r4:848aec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848aec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bba00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f1d9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85352b8c r4:85352800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85352b8c r4:850c3200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848aec00 r8:850c322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3200 r8:80287e08 r7:ecaa5e60 r6:85286f00 r5:848aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab1fb0 to 0xecab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bbb00 INFO: task kworker/1:338:6033 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b21ad000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8488ec00 r8:850c32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:6037 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecabdd84 r8:00000002 r7:60000113 r6:ecabdd8c r5:858e2400 r4:858e2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecabde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f1e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec611000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535338c r4:85353000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535338c r4:850c3300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e2400 r8:850c332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3300 r8:80287e08 r7:ecab9e60 r6:851d0000 r5:858e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecabdfb0 to 0xecabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bba40 INFO: task kworker/1:340:6037 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b25bf000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85353f8c r4:850c3380 r10:00000000 r9:850c3380 r8:80287e08 r7:ecab9e60 r6:851d0080 r5:85159800 r4:850bbc40 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:6043 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:6043 tgid:6043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecacdd84 r8:00000002 r7:60000113 r6:ecacdd8c r5:8515b000 r4:8515b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8515b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbf40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8515b000 r7:00000000 r6:83018200 r5:00001000 r4:7f1e5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec681000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85353b8c r4:85353800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8515b000 r8:850c342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb900 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850c3480 r8:80287e08 r7:ecac5e60 r6:851d0180 r5:85158c00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:6046 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:6046 tgid:6046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecad9d84 r8:00000002 r7:60000113 r6:ecad9d8c r5:8515a400 r4:8515a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8515a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c0ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8515a400 r7:00000000 r6:83018200 r5:00001000 r4:7f1eb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c078c r4:859c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c078c r4:850c3500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8515a400 r8:850c352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3500 r8:80287e08 r7:ecad1e60 r6:851d0200 r5:8515a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cb9c0 INFO: task kworker/1:344:6046 is blocked on a mutex likely owned by task kworker/1:7:3126. Workqueue: events bpf_prog_free_deferred dd20: b33cd000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: b3d46000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:6050 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecae9d84 r8:00000002 r7:60000013 r6:ecae9d8c r5:8515c800 r4:8515c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8515c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e7100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8515c800 r7:00000000 r6:83018200 r5:00001000 r4:7f1ed000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c0b8c r4:859c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c0b8c r4:850c3600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8515c800 r8:850c362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3600 r8:80287e08 r7:ecae1e60 r6:851d0300 r5:8515c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae9fb0 to 0xecae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb680 INFO: task kworker/1:346:6050 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:6053 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:859c178c r4:850c3680 r10:00000000 r9:850c3680 r8:80287e08 r7:ecae1e60 r6:851d0380 r5:8515e000 r4:850e7080 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8515bc00 r8:850c372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3700 r8:80287e08 r7:ecaf5e60 r6:851d0400 r5:8515bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e7300 INFO: task kworker/1:348:6054 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b4287000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:6059 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:6059 tgid:6059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf1d84 r8:00000002 r7:60000013 r6:ecaf1d8c r5:85158000 r4:85158000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85158000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e76c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85158000 r7:00000000 r6:83018200 r5:00001000 r4:7f1f9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c1b8c r4:859c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c1b8c r4:850c3800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85158000 r8:850c382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3800 r8:80287e08 r7:ecaf5e60 r6:851d0480 r5:85158000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf1fb0 to 0xecaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e7480 INFO: task kworker/1:349:6059 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b4576000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dfa0ddc0 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8599b000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e7a00 r5:859c1f8c r4:859c1c00 r7:ddde2d80 r6:83018200 r5:859c1f8c r4:850c3780 r10:00000000 r9:850c3780 r8:80287e08 r7:ecaf1e60 r6:850c3880 r5:8599b000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:351:6064 blocked for more than 473 seconds. r5:8599c800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8599c800 r8:850c392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:351:6064 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b4b1e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:6065 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb29d84 r8:00000002 r7:60000113 r6:ecb29d8c r5:8599bc00 r4:8599bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8599bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb29e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e7cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8599bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f1ff000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c238c r4:859c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c238c r4:850c3a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8599bc00 r8:850c3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3a00 r8:80287e08 r7:ecb25e60 r6:850c3a80 r5:8599bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb29fb0 to 0xecb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 r4:84867140 task:kworker/1:353 state:D stack:0 pid:6067 tgid:6067 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8599a400 r8:850c3bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec571000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec549fb0 to 0xec549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e7c80 INFO: task kworker/1:354:6072 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b5428000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:6075 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:6075 tgid:6075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec76dd84 r8:00000002 r7:60000113 r6:ec76dd8c r5:858f0000 r4:858f0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e7340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f13f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c2f8c r4:859c2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c2f8c r4:850c3c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f0000 r8:850c3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3c80 r8:80287e08 r7:ecb25e60 r6:851d0600 r5:858f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:850e7e80 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:6078 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec791d84 r8:00000002 r7:60000113 r6:ec791d8c r5:858f1800 r4:858f1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f175000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596fb8c r4:8596f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8596fb8c r4:850c3d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f1800 r8:850c3d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3d00 r8:80287e08 r7:ecb25e60 r6:851d0680 r5:858f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec791fb0 to 0xec791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e7fc0 INFO: task kworker/1:356:6078 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8599d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec781e08 r9:83018205 r8:8599d400 r7:00000000 r6:83018200 r5:00001000 r4:7f181000 r5:859c338c r4:859c3000 r4:850c3d80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:6107 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9a9d84 r8:00000002 r7:60000113 r6:ec9a9d8c r5:8599ec00 r4:8599ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8599ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b8e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8599ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f1c1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c3b8c r4:859c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c3b8c r4:850c3e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8599ec00 r8:850c3eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c3e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c3e80 r8:80287e08 r7:ecb25e60 r6:850c3f00 r5:8599ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a9fb0 to 0xec9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d13c0 INFO: task kworker/1:358:6107 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b5c15000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:85999800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4e40 r5:859c438c r4:859c4000 r10:61c88647 r9:85999800 r8:850c3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:6137 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:6137 tgid:6137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb71d84 r8:00000002 r7:60000113 r6:ecb71d8c r5:85998c00 r4:85998c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85998c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85998c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1ed000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a7cf8c r4:84a7cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7cf8c r4:85956000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85998c00 r8:8595602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85956000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85956000 r8:80287e08 r7:ecb19e60 r6:85956080 r5:85998c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb71fb0 to 0xecb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4000 INFO: task kworker/1:360:6137 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b5d99000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859a0000 r4:8291a680 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:859a0000 r8:8595612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:859a2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84597e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f275000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c4b8c r4:859c4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c4b8c r4:85956200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a2400 r8:8595622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85956200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85956200 r8:80287e08 r7:ecb99e60 r6:85956280 r5:859a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba1fb0 to 0xecba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4c40 INFO: task kworker/1:362:6182 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b690b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:6230 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb79e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:859a4800 r8:8595632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:6233 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecba5d84 r8:00000002 r7:60000113 r6:ecba5d8c r5:859a3000 r4:859a3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f0400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f27f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec551000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c578c r4:859c5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c578c r4:85956400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85956400 r8:80287e08 r7:ecb99e60 r6:85956480 r5:859a3000 r4:859f0000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:859a5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r9:83018205 r8:859a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2e3000 r5:859c6b8c r4:859c6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b73f2000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:6280 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:6280 tgid:6280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd05d84 r8:00000002 r7:60000113 r6:ecd05d8c r5:859a1800 r4:859a1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:859c678c r4:859c6400 r10:61c88647 r9:859a1800 r8:8595662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:366:6280 is blocked on a mutex likely owned by task kworker/1:7:3126. dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:367:6297 blocked for more than 473 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:859a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2e5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:6299 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:6299 tgid:6299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc69d84 r8:00000002 r7:60000013 r6:ecc69d8c r5:859a6000 r4:859a6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc69e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848e6080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f2e7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c738c r4:859c7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c738c r4:85956800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6000 r8:8595682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85956800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85956800 r8:80287e08 r7:ecd39e60 r6:85956880 r5:859a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a59a00 INFO: task kworker/1:368:6299 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b77c9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:369 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:859a6c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e100 r5:859c778c r4:859c7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b7c3f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:6303 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:6303 tgid:6303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd41d84 r8:00000002 r7:60000013 r6:ecd41d8c r5:859a3c00 r4:859a3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r9:83018205 r8:859a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2eb000 r5:859c7b8c r4:859c7800 r10:61c88647 r9:859a3c00 r8:85956a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85956a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85956a00 r8:80287e08 r7:ecd3de60 r6:85956a80 r5:859a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e040 INFO: task kworker/1:370:6303 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b7c3f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dfa0ddc0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:8599e000 r8:85956b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:858f0c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2ed000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c7f8c r4:859c7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c7f8c r4:85956c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f0c00 r8:85956c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85956c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85956c00 r8:80287e08 r7:ecd45e60 r6:851d0700 r5:858f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd55fb0 to 0xecd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e340 INFO: task kworker/1:372:6308 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:e0053000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:373:6309 blocked for more than 473 seconds. r4:858f2400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:859d078c r4:859d0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e440 INFO: task kworker/1:373:6309 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b87d3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:6311 blocked for more than 473 seconds. r10:8291a684 r9:ecd5dd84 r8:00000002 r7:60000013 r6:ecd5dd8c r5:858f5400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec999000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a7df8c r4:85956d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f5400 r8:85956d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85956d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85956d00 r8:80287e08 r7:ecd59e60 r6:851d0800 r5:858f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd5dfb0 to 0xecd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e440 INFO: task kworker/1:374:6311 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b87d3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:858f4800 r8:85956dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:375:6313 is blocked on a mutex likely owned by task kworker/1:7:3126. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85956e00 r10:00000000 r9:85956e00 r8:80287e08 r7:ecd59e60 r6:851d0900 r5:858f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd65fb0 to 0xecd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e940 INFO: task kworker/1:376:6314 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b8d16000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:859d038c r4:859d0000 r10:00000000 r9:85956e80 r8:80287e08 r7:ecd59e60 r6:851d0980 r5:858f6c00 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:00000001 INFO: task kworker/1:378:6322 blocked for more than 473 seconds. r4:00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f303000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d0f8c r4:859d0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859d0f8c r4:85956f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f6000 r8:85956f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85956f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85956f00 r8:80287e08 r7:ecd59e60 r6:851d0a00 r5:858f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6ec80 INFO: task kworker/1:378:6322 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:dfa0ddc0 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r5:00001000 r4:ecd79000 r10:61c88647 r9:858f3c00 r8:85956fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 task:kworker/1:380 state:D stack:0 pid:6326 tgid:6326 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:8515ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f305000 r4:85a6a000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: b9cf9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 INFO: task kworker/1:381:6328 blocked for more than 474 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:859d178c r4:859d1400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a71100 INFO: task kworker/1:381:6328 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) r5:800f0013 r4:80239bb0 r5:00001000 r4:e0053000 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:859d1b8c r4:85a6a100 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:6332 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:6332 tgid:6332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdb1d84 r8:00000002 r7:60000013 r6:ecdb1d8c r5:855c0c00 r4:855c0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f30b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecda9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859d1f8c r4:859d1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:384:6334 blocked for more than 474 seconds. r4:855c1800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdd9d84 r8:00000002 r7:60000013 r6:ecdd9d8c r5:855c3c00 r4:855c3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f30f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d278c r4:859d2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859d278c r4:85a6a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c3c00 r8:85a6a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a280 r8:80287e08 r7:ecdc5e60 r6:851d0d80 r5:855c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd9fb0 to 0xecdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a715c0 INFO: task kworker/1:385:6337 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:855c2400 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a71680 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855c3000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ece05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d378c r4:859d3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859d378c r4:85a6a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c3000 r8:85a6a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a380 r8:80287e08 r7:ecde9e60 r6:851d0e80 r5:855c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf9fb0 to 0xecdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a717c0 INFO: task kworker/1:387:6341 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ba7b1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:6342 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:6342 tgid:6342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdfdd84 r8:00000002 r7:60000013 r6:ecdfdd8c r5:855c6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdfde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855c6000 r8:85a6a42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a400 r8:80287e08 r7:ecdf9e60 r6:851d0f00 r5:855c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdfdfb0 to 0xecdfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a717c0 INFO: task kworker/1:388:6342 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ba7b1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:6343 blocked for more than 474 seconds. r10:8291a684 r9:ecd71d84 r8:00000002 r7:60000113 r6:ecd71d8c r5:85400c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859d338c r4:859d3000 r7:ddde2d80 r6:83018200 r5:859d338c r4:85a6a480 r10:00000000 r9:85a6a480 r8:80287e08 r7:ecdf9e60 r6:85a6a500 r5:85400c00 r4:85a718c0 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85402400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece09e08 r9:83018205 r8:85402400 r7:00000000 r6:83018200 r5:00001000 r4:7f31f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85402400 r8:85a6a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a580 r8:80287e08 r7:ecdf9e60 r6:85a6a600 r5:85402400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece09fb0 to 0xece09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a71b40 INFO: task kworker/1:390:6346 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: baa6d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ece11000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ecdc9d84 r8:00000002 r7:60000013 r6:ecdc9d8c r5:855c5400 r4:855c5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a70140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f31d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r5:00001000 r4:e0053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ece39d84 r8:00000002 r7:60000113 r6:ece39d8c r5:855c6c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f321000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d878c r4:859d8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859d878c r4:85a6a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c6c00 r8:85a6a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a800 r8:80287e08 r7:ece09e60 r6:85a53000 r5:855c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece39fb0 to 0xece39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6eb00 INFO: task kworker/1:393:6353 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63440 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:00001000 r4:e0053000 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a63300 INFO: task kworker/1:395:6357 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bb592000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ece5dd84 r8:00000002 r7:60000113 r6:ece5dd8c r5:85406000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:ece4d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a53280 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece5dfb0 to 0xece5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a63500 INFO: task kworker/1:396:6359 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bb592000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:6361 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ece65000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a637c0 INFO: task kworker/1:398:6363 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bbd41000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:6365 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:6365 tgid:6365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece89d84 r8:00000002 r7:60000013 r6:ece89d8c r5:859a8000 r4:859a8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:ece71000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ece8dd84 r8:00000002 r7:60000013 r6:ece8dd8c r5:859a8c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859da38c r4:859da000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859da38c r4:85a53680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a8c00 r8:85a536ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a53680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a53680 r8:80287e08 r7:ece75e60 r6:85a53700 r5:859a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece8dfb0 to 0xece8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a63380 INFO: task kworker/1:400:6367 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bc354000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:6370 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:6370 tgid:6370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece25d84 r8:00000002 r7:60000013 r6:ece25d8c r5:859a9800 r4:859a9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece25e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6eb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f331000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859da78c r4:859da400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859da78c r4:85a53780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a9800 r8:85a537ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a53780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a53780 r8:80287e08 r7:ece8de60 r6:85a53800 r5:859a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece25fb0 to 0xece25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6efc0 INFO: task kworker/1:401:6370 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bc354000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:859aa400 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859daf8c r4:85a53880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859aa400 r8:85a538ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a53880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a53880 r8:80287e08 r7:ece25e60 r6:85a53900 r5:859aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece99fb0 to 0xece99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a60000 INFO: task kworker/1:402:6371 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 r5:800f0013 r4:80239bb0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:859dab8c r4:859da800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a60240 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb1e08 r5:00001000 r4:dfc25000 r5:859db38c r4:859db000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a60180 Call trace: r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bc834000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:405 state:D stack:0 pid:6377 tgid:6377 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859ac800 r8:85a53bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb75b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a53c80 r8:80287e08 r7:eceb5e60 r6:85a53d00 r5:859ad400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a60500 INFO: task kworker/1:406:6379 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bcb39000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:6381 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:6381 tgid:6381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecebdd84 r8:00000002 r7:60000113 r6:ecebdd8c r5:859ae000 r4:859ae000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ae000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecebde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a60c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565478c r4:85654400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a53d80 r8:80287e08 r7:eceb9e60 r6:85a53e00 r5:859ae000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a60500 INFO: task kworker/1:407:6381 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bd18f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:6383 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:6383 tgid:6383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecec9d84 r8:00000002 r7:60000113 r6:ecec9d8c r5:85418c00 r4:85418c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85418c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a60980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85418c00 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb929000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859dbf8c r4:859dbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859dbf8c r4:85a53e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418c00 r8:85a53eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a53e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a53e80 r8:80287e08 r7:ecebde60 r6:85a6a880 r5:85418c00 r4:00000001 Exception stack(0xecec9fb0 to 0xecec9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:409:6385 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a60ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85418000 r7:00000000 r6:83018200 r5:00001000 r4:7f33d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565438c r4:85654000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565438c r4:85a53f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418000 r8:85a53f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a53f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a53f00 r8:80287e08 r7:ecebde60 r6:85a6a900 r5:85418000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a60940 INFO: task kworker/1:409:6385 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bd18f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeced9fb0 to 0xeced9ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:6388 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:6388 tgid:6388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceddd84 r8:00000002 r7:60000113 r6:eceddd8c r5:8541bc00 r4:8541bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85654b8c r4:85654800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85654b8c r4:85a4c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541bc00 r8:85a4c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c000 r8:80287e08 r7:eced9e60 r6:85a6aa00 r5:8541bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a60a80 INFO: task kworker/1:411:6388 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bd404000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:dfa0ddc0 r5:00001000 r4:e0053000 r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:6390 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:6390 tgid:6390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecee5d84 r8:00000002 r7:60000013 r6:ecee5d8c r5:8541a400 r4:8541a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a60ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541a400 r7:00000000 r6:83018200 r5:00001000 r4:7f343000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec605000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85654f8c r4:85654c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85654f8c r4:85a4c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541a400 r8:85a4c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c080 r8:80287e08 r7:eced9e60 r6:85a6aa80 r5:8541a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee5fb0 to 0xecee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a60b80 INFO: task kworker/1:412:6390 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bd404000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8565538c r4:85a4c100 r4:00000001 r4:85a60d40 Call trace: [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r4:dfa0ddc0 r4:00000000 r5:00001000 r4:e0053000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 r4:84867140 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8541c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a62cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541c800 r7:00000000 r6:83018200 r5:00001000 r4:7f347000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565578c r4:85655400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565578c r4:85a4c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541c800 r8:85a4c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c180 r8:80287e08 r7:eced9e60 r6:85a6ab80 r5:8541c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef5fb0 to 0xecef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a60e40 INFO: task kworker/1:414:6394 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bdb43000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a4c200 r8:80287e08 r7:eced9e60 r6:85a6ac00 r5:8541e000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:6398 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:6398 tgid:6398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf05d84 r8:00000002 r7:60000013 r6:ecf05d8c r5:85419800 r4:85419800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85419800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a03040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85419800 r7:00000000 r6:83018200 r5:00001000 r4:7f34b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85655f8c r4:85655c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85655f8c r4:85a4c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85419800 r8:85a4c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c280 r8:80287e08 r7:eced9e60 r6:85a6ac80 r5:85419800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf05fb0 to 0xecf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a620c0 INFO: task kworker/1:416:6398 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ecf0dd84 r8:00000002 r7:60000113 r6:ecf0dd8c r5:8541ec00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecf0dfb0 to 0xecf0dff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85518c00 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a03400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85518c00 r7:00000000 r6:83018200 r5:00001000 r4:7f34f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565678c r4:85656400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565678c r4:85a4c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85518c00 r8:85a4c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c380 r8:80287e08 r7:eced9e60 r6:85a6ad80 r5:85518c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf15fb0 to 0xecf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a03100 INFO: task kworker/1:418:6402 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: be486000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:6407 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r10:8291a684 r9:ecec1d84 r8:00000002 r7:60000013 r6:ecec1d8c r5:85519800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a03940 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a03500 INFO: task kworker/1:419:6407 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: be940000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:6414 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:6414 tgid:6414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf45d84 r8:00000002 r7:60000113 r6:ecf45d8c r5:8551a400 r4:8551a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf45e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a03b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551a400 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf37000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565738c r4:85657000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565738c r4:85a4c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551a400 r8:85a4c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c480 r8:80287e08 r7:eced9e60 r6:85a6ae80 r5:8551a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf45fb0 to 0xecf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a03840 INFO: task kworker/1:420:6414 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: be940000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:6415 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:6415 tgid:6415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf51d84 r8:00000002 r7:60000013 r6:ecf51d8c r5:8551c800 r4:8551c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf51e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a03c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551c800 r7:00000000 r6:83018200 r5:00001000 r4:7f363000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565778c r4:85657400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565778c r4:85a4c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551c800 r8:85a4c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c500 r8:80287e08 r7:ecf45e60 r6:85a6af00 r5:8551c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf51fb0 to 0xecf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a038c0 INFO: task kworker/1:421:6415 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bf372000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 r4:8551b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a03dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:6419 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:6419 tgid:6419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf69d84 r8:00000002 r7:60000013 r6:ecf69d8c r5:8551e000 r4:8551e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f5300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551e000 r7:00000000 r6:83018200 r5:00001000 r4:7f36f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85640f8c r4:85640c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85640f8c r4:85a4c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551e000 r8:85a4c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c600 r8:80287e08 r7:ecf59e60 r6:859f6000 r5:8551e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf69fb0 to 0xecf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a03c40 INFO: task kworker/1:423:6419 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bf8e7000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecf6b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:6422 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:6422 tgid:6422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf7dd84 r8:00000002 r7:60000113 r6:ecf7dd8c r5:85518000 r4:85518000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85518000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a035c0 r5:00001000 r4:ecf7f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a4c700 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85a03d80 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: bf8e7000 eb0cd000 00000001 80239b98 7f13f000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848e4640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f36b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564078c r4:85640400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564078c r4:85a4c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551ec00 r8:85a4c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c780 r8:80287e08 r7:ecf69e60 r6:859f6180 r5:8551ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf8dfb0 to 0xecf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a03d80 INFO: task kworker/1:426:6424 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: bfecb000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:6426 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:6426 tgid:6426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf25d84 r8:00000002 r7:60000113 r6:ecf25d8c r5:859aec00 r4:859aec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859aec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf25e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ecf9b000 r5:85640b8c r4:85640800 r4:85a4c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c800 r8:80287e08 r7:ecf69e60 r6:85a4c880 r5:859aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f5000 INFO: task kworker/1:427:6426 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c0284000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:6429 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:6429 tgid:6429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf99d84 r8:00000002 r7:60000113 r6:ecf99d8c r5:85998000 r4:85998000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85998000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f5680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85998000 r7:00000000 r6:83018200 r5:00001000 r4:7f373000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564178c r4:85641400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564178c r4:85a4c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85998000 r8:85a4c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4c900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4c900 r8:80287e08 r7:ecf69e60 r6:85a4c980 r5:85998000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf99fb0 to 0xecf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f5180 INFO: task kworker/1:428:6429 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c0786000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:429:6430 blocked for more than 474 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecfb3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecfb1d84 r8:00000002 r7:60000013 r6:ecfb1d8c r5:85406c00 r4:85406c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85406c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f5940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f377000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85641f8c r4:85641c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85641f8c r4:85a4cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406c00 r8:85a4cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4cb00 r8:80287e08 r7:ecf99e60 r6:85a4cb80 r5:85406c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb1fb0 to 0xecfb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f5480 INFO: task kworker/1:430:6433 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c0b5c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:6435 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:6435 tgid:6435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfc5d84 r8:00000002 r7:60000013 r6:ecfc5d8c r5:859b0000 r4:859b0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85641b8c r4:85641800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85641b8c r4:85a4cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b0000 r8:85a4cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4cc00 r8:80287e08 r7:ecfb1e60 r6:85a4cc80 r5:859b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfc5fb0 to 0xecfc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f5480 INFO: task kworker/1:431:6435 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:6438 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:6438 tgid:6438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfddd84 r8:00000002 r7:60000013 r6:ecfddd8c r5:859b1800 r4:859b1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfdde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f5c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f37b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564278c r4:85642400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564278c r4:85a4ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b1800 r8:85a4ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4ce00 r8:80287e08 r7:ecfd1e60 r6:85a4ce80 r5:859b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfddfb0 to 0xecfddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f5a00 INFO: task kworker/1:433:6438 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c0ed3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85642b8c r4:85a4cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b2400 r8:85a4cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a4cf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a4cf00 r8:80287e08 r7:ecfdde60 r6:85a4cf80 r5:859b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfe9fb0 to 0xecfe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f5c00 INFO: task kworker/1:434:6441 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c1205000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:859b3000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f5f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:859e1000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e1000 r8:80287e08 r7:ecfe9e60 r6:859e1080 r5:859b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed001fb0 to 0xed001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f5840 INFO: task kworker/1:435:6444 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c1733000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84867140 task:kworker/1:436 state:D stack:0 pid:6445 tgid:6445 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8564338c r4:85643000 r7:ddde2d80 r6:83018200 r5:8564338c r4:859e1100 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:6448 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed00dd84 r8:00000002 r7:60000113 r6:ed00dd8c r5:859b4800 r4:859b4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed00de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e7040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564378c r4:85643400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564378c r4:859e1200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed019e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:859b5400 r8:859e132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:6451 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed025d84 r8:00000002 r7:60000013 r6:ed025d8c r5:859b6000 r4:859b6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e7380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f385000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed027000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85643b8c r4:85643800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85643b8c r4:859e1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b6000 r8:859e142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e1400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e1400 r8:80287e08 r7:ed019e60 r6:859e1480 r5:859b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed025fb0 to 0xed025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852e7200 INFO: task kworker/1:439:6451 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c1e43000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed031e08 r9:83018205 r8:859b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f389000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:441 state:D stack:0 pid:6455 tgid:6455 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:859e1600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:441:6455 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c265a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:6457 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:6457 tgid:6457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed049d84 r8:00000002 r7:60000113 r6:ed049d8c r5:85ab8c00 r4:85ab8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ab8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8561cb8c r4:8561c800 r7:ddde2d80 r6:83018200 r5:8561cb8c r4:859e1700 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: c2886000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e7ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ab9800 r7:00000000 r6:83018200 r5:00001000 r4:7f38f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed063000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561cf8c r4:8561cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561cf8c r4:859e1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab9800 r8:859e182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e1800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e1800 r8:80287e08 r7:ed049e60 r6:859e1880 r5:85ab9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed055fb0 to 0xed055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852e7800 INFO: task kworker/1:443:6460 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:6461 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:6461 tgid:6461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed061d84 r8:00000002 r7:60000013 r6:ed061d8c r5:85aba400 r4:85aba400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aba400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8561d78c r4:8561d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:445:6463 blocked for more than 475 seconds. r4:85abb000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85abb000 r8:859e1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:446 state:D stack:0 pid:6465 tgid:6465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed079d84 r8:00000002 r7:60000013 r6:ed079d8c r5:85abbc00 r4:85abbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85abbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed079e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e7f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2d9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561db8c r4:8561d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561db8c r4:859e1b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abbc00 r8:859e1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e1b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e1b00 r8:80287e08 r7:ed061e60 r6:859e1b80 r5:85abbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed079fb0 to 0xed079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852e7b80 INFO: task kworker/1:446:6465 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c31d9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:447:6470 blocked for more than 475 seconds. r5:85abd400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8561df8c r4:8561dc00 r10:61c88647 r9:85abd400 r8:859e1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c3775000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:6471 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:6471 tgid:6471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed099d84 r8:00000002 r7:60000113 r6:ed099d8c r5:85abe000 r4:85abe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85abe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed099e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a033c0 r5:8561e38c r4:8561e000 r10:61c88647 r9:85abe000 r8:859e1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebae1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:859e1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e1e00 r8:80287e08 r7:ed099e60 r6:859e1e80 r5:85ac0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a1fb0 to 0xed0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85488200 INFO: task kworker/1:449:6473 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c3f08000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:450:6474 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0a5d84 r8:00000002 r7:60000113 r6:ed0a5d8c r5:85ac0c00 r4:85ac0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ac0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f301000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2f38c r4:85a2f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2f38c r4:859e1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac0c00 r8:859e1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e1f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e1f00 r8:80287e08 r7:ed0a1e60 r6:859e1f80 r5:85ac0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a5fb0 to 0xed0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85488200 INFO: task kworker/1:450:6474 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a3878c r4:85a38400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84864380 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:6497 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0ddd84 r8:00000002 r7:60000113 r6:ed0ddd8c r5:85ac5400 r4:85ac5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f32c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ac5400 r7:00000000 r6:83018200 r5:00001000 r4:7f329000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561eb8c r4:8561e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561eb8c r4:8534f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac5400 r8:8534f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534f100 r8:80287e08 r7:ed0a1e60 r6:8534f180 r5:85ac5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0ddfb0 to 0xed0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecea9d84 r8:00000002 r7:60000113 r6:ecea9d8c r5:85ac3000 r4:85ac3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ac3000 r7:00000000 r6:83018200 r5:00001000 r4:7f32d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561f38c r4:8561f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561f38c r4:8534f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac3000 r8:8534f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534f200 r8:80287e08 r7:ed0a1e60 r6:8534f280 r5:85ac3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f3200 INFO: task kworker/1:453:6509 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed085d84 r8:00000002 r7:60000013 r6:ed085d8c r5:85ac6c00 r4:85ac6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed085e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ac6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f32f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec585000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561f78c r4:8561f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561f78c r4:8534f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac6c00 r8:8534f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534f300 r8:80287e08 r7:ecea9e60 r6:8534f380 r5:85ac6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed085fb0 to 0xed085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f3580 INFO: task kworker/1:454:6512 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r5:85ac6000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8561fb8c r4:8561f800 r10:61c88647 r9:85ac6000 r8:8534f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 task:kworker/1:456 state:D stack:0 pid:6515 tgid:6515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf3de08 r5:00001000 r4:ec803000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: c58bc000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:6517 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:6517 tgid:6517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf4dd84 r8:00000002 r7:60000113 r6:ecf4dd8c r5:85ac3c00 r4:85ac3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ac3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f335000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ac38c r4:855ac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ac38c r4:8534f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac3c00 r8:8534f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534f600 r8:80287e08 r7:ecf3de60 r6:8534f680 r5:85ac3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf4dfb0 to 0xecf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f3880 INFO: task kworker/1:457:6517 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:458:6519 blocked for more than 475 seconds. r5:85ac2400 r4:8291a680 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85ac2400 r8:8534f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:6521 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf65d84 r8:00000002 r7:60000113 r6:ecf65d8c r5:85abec00 r4:85abec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85abec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85abec00 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855acf8c r4:855acc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855acf8c r4:8534f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abec00 r8:8534f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534f800 r8:80287e08 r7:ecf61e60 r6:8534f880 r5:85abec00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf71e08 r5:00001000 r4:eca31000 r5:855acb8c r4:855ac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855acb8c r4:8534f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abc800 r8:8534f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534f900 r8:80287e08 r7:ecf65e60 r6:8534f980 r5:85abc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf71fb0 to 0xecf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f3d00 INFO: task kworker/1:460:6523 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c6031000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:461:6525 blocked for more than 475 seconds. r5:85ad0000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855ad38c r4:855ad000 r10:61c88647 r9:85ad0000 r8:8534fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c6453000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ad0c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecb63000 r7:ddde2d80 r6:83018200 r5:855ad78c r4:8534fb00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c67fb000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:6529 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:6529 tgid:6529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf95d84 r8:00000002 r7:60000113 r6:ecf95d8c r5:85ad1800 r4:85ad1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf95e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533f740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad1800 r7:00000000 r6:83018200 r5:00001000 r4:7f345000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ae38c r4:855ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ae38c r4:8534fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad1800 r8:8534fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534fc00 r8:80287e08 r7:ecf89e60 r6:8534fc80 r5:85ad1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf95fb0 to 0xecf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533f100 INFO: task kworker/1:463:6529 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: c6b80000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:6533 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:855adf8c r4:855adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855adf8c r4:8534fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad3000 r8:8534fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534fe00 r8:80287e08 r7:ecf95e60 r6:8534fe80 r5:85ad3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfa1fb0 to 0xecfa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533f440 INFO: task kworker/1:465:6533 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c6e3c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfade08 r4:00000000 r5:855ae78c r4:855ae400 r7:ddde2d80 r6:83018200 r5:855ae78c r4:8534ff00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:855af38c r4:855af000 r10:61c88647 r9:85ad4800 r8:8535b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:468:6539 blocked for more than 475 seconds. r5:85ad5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfcde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533fa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad5400 r7:00000000 r6:83018200 r5:00001000 r4:7f349000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855aeb8c r4:855ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855aeb8c r4:8535b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad5400 r8:8535b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b100 r8:80287e08 r7:ecfc1e60 r6:8535b180 r5:85ad5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfcdfb0 to 0xecfcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533f900 INFO: task kworker/1:468:6539 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c792c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 r4:85ad6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfe5e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85ad6000 r8:8535b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:6544 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:6544 tgid:6544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfd9d84 r8:00000002 r7:60000113 r6:ecfd9d8c r5:85ad6c00 r4:85ad6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfd9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535aac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f35d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ececb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855afb8c r4:855af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855afb8c r4:8535b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad6c00 r8:8535b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b300 r8:80287e08 r7:ecfc1e60 r6:8535b380 r5:85ad6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfd9fb0 to 0xecfd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: c792c000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85ad8000 r8:8535b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: c82cf000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85ad8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecffde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852db100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566038c r4:85660000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566038c r4:8535b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad8c00 r8:8535b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b500 r8:80287e08 r7:ecfd9e60 r6:8535b580 r5:85ad8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecffdfb0 to 0xecffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859f3040 INFO: task kworker/1:472:6548 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c82cf000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:6549 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:6549 tgid:6549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfa5d84 r8:00000002 r7:60000013 r6:ecfa5d8c r5:85ad9800 r4:85ad9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85ad9800 r8:8535b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed015e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852db280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85adb000 r7:00000000 r6:83018200 r5:00001000 r4:7f363000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566078c r4:85660400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566078c r4:8535b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85adb000 r8:8535b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b700 r8:80287e08 r7:ecffde60 r6:8535b780 r5:85adb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed015fb0 to 0xed015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852db1c0 INFO: task kworker/1:474:6551 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:6553 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:6553 tgid:6553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed021d84 r8:00000002 r7:60000113 r6:ed021d8c r5:85adbc00 r4:85adbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85adbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85adbc00 r8:8535b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c8c18000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:476 state:D stack:0 pid:6555 tgid:6555 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:8566138c r4:85661000 r10:61c88647 r9:85ada400 r8:8535b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852db940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ade000 r7:00000000 r6:83018200 r5:00001000 r4:7f36d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85660f8c r4:85660c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85660f8c r4:8535ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ade000 r8:8535ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535ba00 r8:80287e08 r7:ed039e60 r6:8535ba80 r5:85ade000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed05dfb0 to 0xed05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852db740 INFO: task kworker/1:477:6560 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c8eb4000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:6561 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:6561 tgid:6561 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85add400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed069e08 r5:00001000 r4:dfc55000 r5:85661f8c r4:85661c00 r4:8535bb00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: c9161000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:6563 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:6563 tgid:6563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed051d84 r8:00000002 r7:60000013 r6:ed051d8c r5:85adc800 r4:85adc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85adc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed051e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dbe00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85adc800 r7:00000000 r6:83018200 r5:00001000 r4:7f371000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566178c r4:85661400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566178c r4:8535bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85adc800 r8:8535bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535bc00 r8:80287e08 r7:ed069e60 r6:8535bc80 r5:85adc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed051fb0 to 0xed051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852db780 INFO: task kworker/1:479:6563 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85ae1800 r8:8535bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:6570 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:6570 tgid:6570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0fdd84 r8:00000002 r7:60000013 r6:ed0fdd8c r5:85ae0c00 r4:85ae0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ae0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba500 r5:8566238c r4:85662000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85ae2400 r7:00000000 r6:83018200 r5:00001000 r4:7f2e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566278c r4:85662400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566278c r4:8535bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ae2400 r8:8535bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535bf00 r8:80287e08 r7:ed0fde60 r6:8535bf80 r5:85ae2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f9fb0 to 0xed0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ba380 INFO: task kworker/1:482:6573 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c9a16000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:6574 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:6574 tgid:6574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed02dd84 r8:00000002 r7:60000013 r6:ed02dd8c r5:85ae3000 r4:85ae3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ae3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed02de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85ae3000 r7:00000000 r6:83018200 r5:00001000 r4:7f2e3000 r7:ddde2d80 r6:83018200 r5:85662b8c r4:8535c000 Exception stack(0xed02dfb0 to 0xed02dff8) Workqueue: events bpf_prog_free_deferred dd20: c9a16000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:6576 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:6576 tgid:6576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed101d84 r8:00000002 r7:60000113 r6:ed101d8c r5:85ae3c00 r4:85ae3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ae3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed101e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba900 r5:85662f8c r4:85662c00 r7:ddde2d80 r6:83018200 r5:85662f8c r4:8535c100 r10:00000000 r9:8535c100 r8:80287e08 r7:ed02de60 r6:8535c180 r5:85ae3c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:485:6578 blocked for more than 476 seconds. r5:85ae4800 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8566338c r4:85663000 r10:61c88647 r9:85ae4800 r8:8535c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ba980 INFO: task kworker/1:485:6578 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: c9eeb000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:6580 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:6580 tgid:6580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed009d84 r8:00000002 r7:60000113 r6:ed009d8c r5:85ae5400 r5:85ae5400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed009e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bac00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8566378c r4:85663400 r4:8535c300 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: c9eeb000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:6582 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:6582 tgid:6582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed109d84 r8:00000002 r7:60000113 r6:ed109d8c r5:85ae6000 r4:85ae6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ae6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bae00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f37b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec905000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85663b8c r4:85663800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85663b8c r4:8535c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ae6000 r8:8535c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535c400 r8:80287e08 r7:ed009e60 r6:8535c480 r5:85ae6000 Exception stack(0xed109fb0 to 0xed109ff8) r4:853baa80 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:488:6584 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8535c500 Exception stack(0xed10dfb0 to 0xed10dff8) r4:853bac80 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:6586 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:6586 tgid:6586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed111d84 r8:00000002 r7:60000113 r6:ed111d8c r5:85ae0000 r4:85ae0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ae0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dbd00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ae0000 r7:00000000 r6:83018200 r5:00001000 r4:7f37f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec997000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562838c r4:85628000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562838c r4:8535c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ae0000 r8:8535c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535c600 r8:80287e08 r7:ed10de60 r6:8535c680 r5:85ae0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853badc0 INFO: task kworker/1:489:6586 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ca673000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:6589 tgid:6589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed115d84 r8:00000002 r7:60000013 r6:ed115d8c r5:85adec00 r4:85adec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85adec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed115e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85adec00 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562878c r4:85628400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562878c r4:8535c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85adec00 r8:8535c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535c700 r8:80287e08 r7:ed111e60 r6:8535c780 r5:85adec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed115fb0 to 0xed115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853baec0 INFO: task kworker/1:490:6589 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:491:6590 blocked for more than 476 seconds. r10:8291a684 r9:ed119d84 r8:00000002 r7:60000113 r6:ed119d8c r5:85ae8000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85628b8c r4:85628800 r10:61c88647 r9:85ae8000 r8:8535c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed119fb0 to 0xed119ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:6592 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:6592 tgid:6592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed11dd84 r8:00000002 r7:60000013 r6:ed11dd8c r5:85ae8c00 r4:85ae8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ae8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed11de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853494c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ae8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f387000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562938c r4:85629000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562938c r4:8535c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ae8c00 r8:8535c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535c900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535c900 r8:80287e08 r7:ed119e60 r6:8535c980 r5:85ae8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed11dfb0 to 0xed11dff8) r4:85349100 INFO: task kworker/1:492:6592 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cad46000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:6594 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:6594 tgid:6594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349340 r9:83018205 r8:85ae9800 r7:00000000 r6:83018200 r5:00001000 r4:7f385000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85628f8c r4:85628c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85628f8c r4:8535ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ae9800 r8:8535ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535ca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535ca00 r8:80287e08 r7:ed11de60 r6:8535ca80 r5:85ae9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed121fb0 to 0xed121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85349280 INFO: task kworker/1:493:6594 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cad46000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:494:6596 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r4:85aea400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85aea400 r7:00000000 r6:83018200 r5:00001000 r4:7f389000 r5:8562978c r4:85629400 r7:ddde2d80 r6:83018200 r5:8562978c r4:8535cb00 r4:8535cb00 r10:00000000 r9:8535cb00 r8:80287e08 r7:ed11de60 r6:8535cb80 r5:85aea400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:853495c0 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cb145000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:6599 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:6599 tgid:6599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed129d84 r8:00000002 r7:60000113 r6:ed129d8c r5:85aeb000 r4:85aeb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aeb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed129e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aeb000 r7:00000000 r6:83018200 r5:00001000 r4:7f38b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85629b8c r4:85629800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85629b8c r4:8535cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aeb000 r8:8535cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535cc00 r8:80287e08 r7:ed125e60 r6:8535cc80 r5:85aeb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed129fb0 to 0xed129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85349480 INFO: task kworker/1:495:6599 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd20: cb5d2000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:6600 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:6600 tgid:6600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed12dd84 r8:00000002 r7:60000113 r6:ed12dd8c r5:85aebc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349c00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562a78c r4:8562a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562a78c r4:8535cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aebc00 r8:8535cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535cd00 r8:80287e08 r7:ed129e60 r6:8535cd80 r5:85aebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed12dfb0 to 0xed12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85349540 INFO: task kworker/1:496:6600 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cb5d2000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84867140 task:kworker/1:497 state:D stack:0 pid:6603 tgid:6603 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85629f8c r4:85629c00 r4:8535ce00 Exception stack(0xed131fb0 to 0xed131ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:498 state:D stack:0 pid:6604 tgid:6604 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed139e08 r9:83018205 r8:85aed400 r7:00000000 r6:83018200 r5:00001000 r4:7f38f000 r7:ddde2d80 r6:83018200 r5:8562a38c r4:8535cf00 r10:00000000 r9:8535cf00 r8:80287e08 r7:ed12de60 r6:8535cf80 r5:85aed400 r4:85349880 INFO: task kworker/1:498:6604 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cb803000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:6607 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:6607 tgid:6607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:8562b78c r4:8562b400 r7:ddde2d80 r6:83018200 r5:8562b78c r4:8558b000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:500:6609 blocked for more than 476 seconds. r4:85aeec00 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8558b100 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:6610 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:6610 tgid:6610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed149d84 r8:00000002 r7:60000113 r6:ed149d8c r5:85af0000 r4:85af0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed149e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af0000 r7:00000000 r6:83018200 r5:00001000 r4:7f395000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562af8c r4:8562ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562af8c r4:8558b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af0000 r8:8558b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b200 r8:80287e08 r7:ed13de60 r6:8558b280 r5:85af0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed149fb0 to 0xed149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85349c80 INFO: task kworker/1:501:6610 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cbce7000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:85af0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed141e08 r9:83018205 r8:85af0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f399000 r7:ddde2d80 r6:83018200 r5:8562b38c r4:8558b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:503:6615 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:503 state:D stack:0 pid:6615 tgid:6615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed14dd84 r8:00000002 r7:60000113 r6:ed14dd8c r5:85af1800 r4:85af1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed14de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595a180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af1800 r7:00000000 r6:83018200 r5:00001000 r4:7f39d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed07b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562bb8c r4:8562b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562bb8c r4:8558b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af1800 r8:8558b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b400 r8:80287e08 r7:ed13de60 r6:8558b480 r5:85af1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed14dfb0 to 0xed14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8595a180 INFO: task kworker/1:503:6615 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cbfc6000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/1:504 state:D stack:0 pid:6617 tgid:6617 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562bf8c r4:8562bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562bf8c r4:8558b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af2400 r8:8558b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b500 r8:80287e08 r7:ed14de60 r6:8558b580 r5:85af2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed151fb0 to 0xed151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8595a340 INFO: task kworker/1:504:6617 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cc2f2000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:6619 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:6619 tgid:6619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed155d84 r8:00000002 r7:60000013 r6:ed155d8c r5:85af3000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85af3000 r8:8558b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:506:6621 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:6621 tgid:6621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed161d84 r8:00000002 r7:60000113 r6:ed161d8c r5:85af3c00 r4:85af3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595a8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed16f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2c78c r4:85b2c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2c78c r4:8558b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af3c00 r8:8558b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b700 r8:80287e08 r7:ed155e60 r6:8558b780 r5:85af3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed161fb0 to 0xed161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r4:00000000 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:6623 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:6623 tgid:6623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed16dd84 r8:00000002 r7:60000013 r6:ed16dd8c r5:85af4800 r4:85af4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed16de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595aa40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af4800 r7:00000000 r6:83018200 r5:00001000 r4:7f3a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2cb8c r4:85b2c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2cb8c r4:8558b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af4800 r8:8558b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b800 r8:80287e08 r7:ed161e60 r6:8558b880 r5:85af4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8595a740 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85af5400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595ad40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af5400 r7:00000000 r6:83018200 r5:00001000 r4:7f3a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed193000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2d38c r4:85b2d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2d38c r4:8558b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af5400 r8:8558b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558b900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b900 r8:80287e08 r7:ed16de60 r6:8558b980 r5:85af5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed179fb0 to 0xed179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8595a840 INFO: task kworker/1:508:6625 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cccd5000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:6627 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:6627 tgid:6627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed185d84 r8:00000002 r7:60000013 r6:ed185d8c r5:85af6000 r4:85af6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed185e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595abc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af6000 r7:00000000 r6:83018200 r5:00001000 r4:7f3a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed187000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2cf8c r4:85b2cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2cf8c r4:8558ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af6000 r8:8558ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558ba00 r8:80287e08 r7:ed179e60 r6:8558ba80 r5:85af6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8595a9c0 INFO: task kworker/1:509:6627 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cccd5000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:6629 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85af6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed191e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85af6c00 r8:8558bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:6631 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:6631 tgid:6631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed19dd84 r8:00000002 r7:60000113 r6:ed19dd8c r5:85af8000 r4:85af8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed19de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595af00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af8000 r7:00000000 r6:83018200 r5:00001000 r4:7f3ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed19f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2d78c r4:85b2d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2d78c r4:8558bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af8000 r8:8558bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558bc00 r8:80287e08 r7:ed191e60 r6:8558bc80 r5:85af8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed19dfb0 to 0xed19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8595ae40 INFO: task kworker/1:511:6631 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cd2cd000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:6632 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:6632 tgid:6632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed145d84 r8:00000002 r7:60000013 r6:ed145d8c r5:85af8c00 r4:85af8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed145e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ba040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85af8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2db8c r4:85b2d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2db8c r4:8558bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af8c00 r8:8558bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558bd00 r8:80287e08 r7:ed191e60 r6:8558bd80 r5:85af8c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85af9800 r8:8558be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:6637 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:6637 tgid:6637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1c1d84 r8:00000002 r7:60000013 r6:ed1c1d8c r5:85afa400 r4:85afa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85afa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ba540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85afa400 r7:00000000 r6:83018200 r5:00001000 r4:7f3b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2e78c r4:85b2e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2e78c r4:8558bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85afa400 r8:8558bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8558bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558bf00 r8:80287e08 r7:ed191e60 r6:8558bf80 r5:85afa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ba240 INFO: task kworker/1:514:6637 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cdc9f000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:515:6639 blocked for more than 476 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:85afb000 r5:85afb000 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85b2eb8c r4:850cd000 r4:850cd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd000 r8:80287e08 r7:ed1c1e60 r6:850cd080 r5:85afb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1cdfb0 to 0xed1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ba340 INFO: task kworker/1:515:6639 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ce3a9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:6642 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:6642 tgid:6642 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85b2f38c r4:85b2f000 r7:ddde2d80 r6:83018200 r5:85b2f38c r4:850cd100 Exception stack(0xed1d9fb0 to 0xed1d9ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred r5:85afc800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850cd200 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ce3a9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:6646 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:6646 tgid:6646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f9d84 r8:00000002 r7:60000113 r6:ed1f9d8c r5:85afd400 r4:85afd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85afd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85b2fb8c r4:85b2f800 r7:ddde2d80 r6:83018200 r5:85b2fb8c r4:850cd300 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:850ba8c0 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 task:kworker/1:519 state:D stack:0 pid:6648 tgid:6648 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bab40 r5:85b2f78c r4:85b2f400 r7:ddde2d80 r6:83018200 r5:85b2f78c r4:850cd400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bae80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85afec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed21f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b2ff8c r4:85b2fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b2ff8c r4:850cd500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85afec00 r8:850cd52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cd500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd500 r8:80287e08 r7:ed1f9e60 r6:850cd580 r5:85afec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed211fb0 to 0xed211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850baac0 INFO: task kworker/1:520:6650 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cea33000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:6652 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:6652 tgid:6652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85b00000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85b3c78c r4:850cd600 r10:00000000 r9:850cd600 r8:80287e08 r7:ed211e60 r6:850cd680 r5:85b00000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:522:6654 blocked for more than 476 seconds. r4:85b00c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed229e08 r9:83018205 r8:85b00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3c38c r4:85b3c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3c38c r4:850cd700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b00c00 r8:850cd72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd700 r8:80287e08 r7:ed21de60 r6:850cd780 r5:85b00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed229fb0 to 0xed229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850baf40 INFO: task kworker/1:522:6654 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: cf0c5000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:6656 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f3c7000 r7:ddde2d80 r6:83018200 r5:85b3cb8c r4:850cd800 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:dfa0ddc0 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b02400 r8:850cd92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:6660 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:6660 tgid:6660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1b5d84 r8:00000002 r7:60000013 r6:ed1b5d8c r5:85b03c00 r4:85b03c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b03c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852df680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed257000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3d38c r4:85b3d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3d38c r4:850cda00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b03c00 r8:850cda2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cda00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cda00 r8:80287e08 r7:ed241e60 r6:850cda80 r5:85b03c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b5fb0 to 0xed1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852df340 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84867140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:850cdb00 Exception stack(0xed261fb0 to 0xed261ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred r4:85b06000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b06000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed279e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b06000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3d78c r4:85b3d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3d78c r4:850cdc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b06000 r8:850cdc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cdc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cdc00 r8:80287e08 r7:ed261e60 r6:850cdc80 r5:85b06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed279fb0 to 0xed279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852df400 INFO: task kworker/1:527:6665 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d0069000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85b06c00 r8:850cdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85b08000 r4:8291a680 r4:00000000 r4:00000000 r5:85b3e78c r4:85b3e400 r10:61c88647 r9:85b08000 r8:850cde2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d0318000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:6701 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:6701 tgid:6701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2f1d84 r8:00000002 r7:60000113 r6:ed2f1d8c r5:85b09800 r4:85b09800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b09800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b09800 r7:00000000 r6:83018200 r5:00001000 r4:7f2d9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec755000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3e38c r4:85b3e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed2f1fb0 to 0xed2f1ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f2e3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3eb8c r4:85b3e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3eb8c r4:853d5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b0a400 r8:853d502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5000 r8:80287e08 r7:ed24de60 r6:853d5080 r5:85b0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed15dfb0 to 0xed15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b1780 INFO: task kworker/1:531:6705 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d06bb000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:6707 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85b3ef8c r4:85b3ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: d093a000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:6709 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:6709 tgid:6709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed18dd84 r8:00000002 r7:60000113 r6:ed18dd8c r5:85b0bc00 r4:85b0bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b0bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed18de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c3140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f30d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3f38c r4:85b3f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3f38c r4:853d5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b0bc00 r8:853d522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5200 r8:80287e08 r7:ed181e60 r6:853d5280 r5:85b0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed18dfb0 to 0xed18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:534:6710 blocked for more than 476 seconds. r5:85b0c800 r4:8291a680 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c3380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f377000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3f78c r4:85b3f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3f78c r4:853d5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b0c800 r8:853d532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5300 r8:80287e08 r7:ed18de60 r6:853d5380 r5:85b0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed169fb0 to 0xed169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c3080 INFO: task kworker/1:534:6710 is blocked on a mutex likely owned by task kworker/1:7:3126. Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:6712 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:6712 tgid:6712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1a5d84 r8:00000002 r7:60000113 r6:ed1a5d8c r5:85b0e000 r4:85b0e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b0e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c3b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b4878c r4:85b48400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b4878c r4:853d5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b0e000 r8:853d542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5400 r8:80287e08 r7:ed169e60 r6:853d5480 r5:85b0e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred r5:85b0d400 r4:8291a680 r4:00000000 r4:00000000 r5:85b3fb8c r4:85b3f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: d0d61000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:537 state:D stack:0 pid:6717 tgid:6717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1b1d84 r8:00000002 r7:60000013 r6:ed1b1d8c r5:85b0ec00 r4:85b0ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b0ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c38c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f37d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b3ff8c r4:85b3fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3ff8c r4:853d5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b0ec00 r8:853d562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5600 r8:80287e08 r7:ed1a5e60 r6:853d5680 r5:85b0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b1fb0 to 0xed1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c3640 INFO: task kworker/1:537:6717 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d1105000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84867140 Workqueue: events bpf_prog_free_deferred r5:85b08c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:853d5700 r8:80287e08 r7:ed1a5e60 r6:853d5780 r5:85b08c00 INFO: task kworker/1:538:6719 is blocked on a mutex likely owned by task kworker/1:7:3126. dd20: d1341000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:6722 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:6722 tgid:6722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1d5d84 r8:00000002 r7:60000113 r6:ed1d5d8c r5:85b04800 r4:85b04800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b04800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c3cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b48b8c r4:85b48800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b48b8c r4:853d5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b04800 r8:853d582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5800 r8:80287e08 r7:ed1a5e60 r6:853d5880 r5:85b04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d5fb0 to 0xed1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c3b40 INFO: task kworker/1:539:6722 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d1341000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:6724 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:6724 tgid:6724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f5d84 r8:00000002 r7:60000113 r6:ed1f5d8c r5:85b03000 r4:85b03000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b03000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c3e00 r9:83018205 r8:85b03000 r7:00000000 r6:83018200 r5:00001000 r4:7f385000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed1f5fb0 to 0xed1f5ff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecde5000 r5:85b4938c r4:85b49000 r10:61c88647 r9:85b10000 r8:853d5a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed199fb0 to 0xed199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c3b40 INFO: task kworker/1:541:6725 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d1a4a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ece0d000 r5:85b4978c r4:85b49400 r10:61c88647 r9:85b10c00 r8:853d5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: d1a4a000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b49b8c r4:85b49800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b49b8c r4:853d5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b11800 r8:853d5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5c00 r8:80287e08 r7:ed201e60 r6:853d5c80 r5:85b11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed20dfb0 to 0xed20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853c3fc0 INFO: task kworker/1:543:6729 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d1a4a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-rc7-syzkaller #0 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85b49f8c r4:85b49c00 r10:00000000 r9:853d5d00 r8:80287e08 r7:ed20de60 r6:853d5d80 r5:85b12400 r4:00000000 r4:82ac21e4 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:6733 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:6733 tgid:6733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed225d84 r8:00000002 r7:60000013 r6:ed225d8c r5:85b13000 r4:85b13000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b13000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed225e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b13000 r7:00000000 r6:83018200 r5:00001000 r4:7f38f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed159000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b4a38c r4:85b4a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b4a38c r4:853d5e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b13000 r8:853d5e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d5e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d5e00 r8:80287e08 r7:ed219e60 r6:853d5e80 r5:85b13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed225fb0 to 0xed225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: dd20: d1d5f000 eb0cd000 00000001 80239b98 7f13f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85b4a78c r4:85b4a400 r10:61c88647 r9:85b13c00 r8:853d5f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:6737 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:6737 tgid:6737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed23dd84 r8:00000002 r7:60000113 r6:ed23dd8c r5:85b14800 r4:85b14800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b14800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed23de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b14800 r7:00000000 r6:83018200 r5:00001000 r4:7f393000 r5:85b4ab8c r4:85b4a800 r7:ddde2d80 r6:83018200 r5:85b4ab8c r4:852d2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b14800 r8:852d202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852d2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d2000 r8:80287e08 r7:ed231e60 r6:852d2080 r5:85b14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed23dfb0 to 0xed23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3440 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85b15400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800f0013 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:6741 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:6741 tgid:6741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed25dd84 r8:00000002 r7:60000113 r6:ed25dd8c r5:85b16000 r4:85b16000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b16000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed25de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d38c0 r7:ddde2d80 r6:83018200 r5:85b4af8c r4:852d2200 r4:00000001 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b16c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b16c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed269e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3bc0 r9:83018205 r8:85b16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f39b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0053000 r4:00000001 INFO: task kworker/1:552:6747 blocked for more than 477 seconds. r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85b4bf8c r4:85b4bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b4bf8c r4:852d2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b18c00 r8:852d252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852d2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d2500 r8:80287e08 r7:ed275e60 r6:852d2580 r5:85b18c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed30dfb0 to 0xed30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3b40 INFO: task kworker/1:552:6747 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d2eb7000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed311e08 r5:85b5078c r4:85b50400 r4:00000001 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85b1a400 r4:8291a680 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b1a400 r8:852d272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852d2700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d2700 r8:80287e08 r7:ed311e60 r6:852d2780 r5:85b1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed319fb0 to 0xed319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d5080 INFO: task kworker/1:554:6752 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d3679000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af7b8c r4:84af7800 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:6753 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:6753 tgid:6753 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r5:00001000 r4:e0053000 r4:00000001 INFO: task kworker/1:556:6756 blocked for more than 477 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 r7:ddde2d80 r6:83018200 r5:85b50b8c r4:852d2900 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800f0013 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed349d84 r8:00000002 r7:60000013 r6:ed349d8c r5:85b1d400 r4:85b1d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b1d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed349e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d54c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b1d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed33f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b50f8c r4:85b50c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b50f8c r4:852d2a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b1d400 r8:852d2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852d2a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85b51b8c r4:85b51800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:00000000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed36de08 r5:85b5178c r4:85b51400 r10:00000000 r9:852d2c00 r8:80287e08 r7:ed355e60 r6:852d2c80 r5:85b20000 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:6764 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:6764 tgid:6764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed379d84 r8:00000002 r7:60000013 r6:ed379d8c r5:85b22400 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:852d2d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:6768 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:6768 tgid:6768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85b5238c r4:85b52000 r10:00000000 r9:852d2f00 r8:80287e08 r7:ed385e60 r6:852d2f80 r5:85b20c00 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a9e08 r5:85b5338c r4:85b53000 r10:61c88647 r9:85b23c00 r8:851c202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851cf100 INFO: task kworker/1:563:6771 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d4c6e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:84af7b8c r4:84af7800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r9:83018205 r8:85b25400 r7:00000000 r6:83018200 r5:00001000 r4:7f3bb000 r4:851c2100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851cf280 INFO: task kworker/1:564:6773 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d4c6e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:00001000 r4:e0053000 r4:84864380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed33de08 r5:85b52f8c r4:85b52c00 r4:851c2200 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800f0013 r4:80239bb0 r5:00001000 r4:e0053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:6776 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85a95400 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:566:6776 is blocked on a mutex likely owned by task kworker/1:7:3126. r4:dfa0ddc0 r5:84af7b8c r4:84af7800 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r9:83018205 r8:85a93000 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 r10:00000000 r9:851c2300 r8:80287e08 r7:ed361e60 r6:859f6300 r5:85a93000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3f1d84 r8:00000002 r7:60000113 r6:ed3f1d8c r5:85a94800 r4:85a94800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a94800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cfa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a94800 r7:00000000 r6:83018200 r5:00001000 r4:7f3c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b53f8c r4:85b53c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b53f8c r4:851c2380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a94800 r8:851c23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c2380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c2380 r8:80287e08 r7:ed361e60 r6:859f6380 r5:85a94800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f1fb0 to 0xed3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cfc80 r5:85b5c38c r4:85b5c000 r10:61c88647 r9:85a92400 r8:851c242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d592b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:6785 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:6785 tgid:6785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed39dd84 r8:00000002 r7:60000013 r6:ed39dd8c r5:85b26c00 r4:85b26c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b26c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed39de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cf080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5cb8c r4:85b5c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5cb8c r4:851c2480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b26c00 r8:851c24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c2480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c2480 r8:80287e08 r7:ed3f5e60 r6:851c2500 r5:85b26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed39dfb0 to 0xed39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851cfb00 INFO: task kworker/1:570:6785 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d5b65000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cfe80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b23000 r7:00000000 r6:83018200 r5:00001000 r4:7f3c9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5c78c r4:85b5c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5c78c r4:851c2580 r10:61c88647 r9:85b23000 r8:851c25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:571:6788 is blocked on a mutex likely owned by task kworker/1:7:3126. dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b1ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cf000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:573:6792 blocked for more than 477 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed401e08 r5:85b5d38c r4:85b5d000 r10:61c88647 r9:85b24800 r8:851c27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 task:kworker/1:574 state:D stack:0 pid:6794 tgid:6794 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed405e08 r5:00001000 r4:ecb69000 r7:ddde2d80 r6:83018200 r5:85b5db8c r4:851c2880 r10:61c88647 r9:85b68000 r8:851c28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c2880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c2880 r8:80287e08 r7:ed401e60 r6:851c2900 r5:85b68000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed405fb0 to 0xed405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a0280 INFO: task kworker/1:574:6794 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d658e000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:575:6795 blocked for more than 477 seconds. r5:85b68c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a0800 r5:85b5d78c r4:85b5d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:576:6799 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848e4dc0 r5:85b5eb8c r4:85b5e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed3c9d84 r8:00000002 r7:60000013 r6:ed3c9d8c r5:85b6bc00 r4:85b6bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b6bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a09c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3db000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5df8c r4:85b5dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5df8c r4:851c2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b6bc00 r8:851c2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c2b80 r8:80287e08 r7:ed40de60 r6:851c2c00 r5:85b6bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c9fb0 to 0xed3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a07c0 INFO: task kworker/1:577:6801 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d6d67000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:6803 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:6803 tgid:6803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3e1d84 r8:00000002 r7:60000013 r6:ed3e1d8c r5:85b6c800 r4:85b6c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b6c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a0c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f3dd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5e38c r4:85b5e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5e38c r4:851c2c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b6c800 r8:851c2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c2c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c2c80 r8:80287e08 r7:ed40de60 r6:851c2d00 r5:85b6c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:dfa0ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:579:6804 blocked for more than 477 seconds. r4:85b6d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed415e08 r9:83018205 r8:85b6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3df000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a0a80 INFO: task kworker/1:579:6804 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d71ee000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:6806 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:6806 tgid:6806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed419d84 r8:00000002 r7:60000113 r6:ed419d8c r5:85b6ec00 r4:85b6ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b6ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed419e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d5d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3e3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b5ef8c r4:85b5ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85b5f38c r4:851c2f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b6e000 r8:851c2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c2f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c2f80 r8:80287e08 r7:ed419e60 r6:851ba000 r5:85b6e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed411fb0 to 0xed411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a5080 INFO: task kworker/1:581:6809 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d7676000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:6811 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:582 state:D stack:0 pid:6811 tgid:6811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed41dd84 r8:00000002 r7:60000113 r6:ed41dd8c r5:85b69800 r4:85b69800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b69800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed41de08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b5f78c r4:85b5f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed41dfb0 to 0xed41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a5240 INFO: task kworker/1:582:6811 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed421e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85b26000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5fb8c r4:851ba280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b26000 r8:851ba2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ba280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ba280 r8:80287e08 r7:ed421e60 r6:851ba300 r5:85b26000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed425fb0 to 0xed425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a5200 INFO: task kworker/1:584:6815 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d79f7000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:6818 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:6818 tgid:6818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed429d84 r8:00000002 r7:60000013 r6:ed429d8c r5:85b1bc00 r4:85b1bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b1bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed429e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a58c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3ef000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba078c r4:85ba0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba078c r4:851ba380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b1bc00 r8:851ba3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ba380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ba380 r8:80287e08 r7:ed421e60 r6:851ba400 r5:85b1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed429fb0 to 0xed429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a5800 INFO: task kworker/1:585:6818 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d7e8c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:6819 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:6819 tgid:6819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed431d84 r8:00000002 r7:60000013 r6:ed431d8c r5:85b70000 r4:85b70000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b70000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed431e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a57c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b70000 r7:00000000 r6:83018200 r5:00001000 r4:7f3ed000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba038c r4:85ba0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba038c r4:851ba480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b70000 r8:851ba4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ba480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ba480 r8:80287e08 r7:ed429e60 r6:851ba500 r5:85b70000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed431fb0 to 0xed431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a55c0 INFO: task kworker/1:586:6819 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d824c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:6821 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:6821 tgid:6821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed42dd84 r8:00000002 r7:60000113 r6:ed42dd8c r5:85b70c00 r4:85b70c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b70c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed42de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3f1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed041000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba0b8c r4:85ba0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba0b8c r4:851ba580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b70c00 r8:851ba5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ba580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ba580 r8:80287e08 r7:ed429e60 r6:851ba600 r5:85b70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed42dfb0 to 0xed42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a56c0 INFO: task kworker/1:587:6821 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d824c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:6823 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:6823 tgid:6823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed435d84 r8:00000002 r7:60000113 r6:ed435d8c r5:85b71800 r4:85b71800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b71800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed435e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b71800 r7:00000000 r6:83018200 r5:00001000 r4:7f3f5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba138c r4:85ba1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba138c r4:851ba680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b71800 r8:851ba6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ba680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ba680 r8:80287e08 r7:ed42de60 r6:851ba700 r5:85b71800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed435fb0 to 0xed435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a5b40 INFO: task kworker/1:588:6823 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d8714000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:6825 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:6825 tgid:6825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed439d84 r8:00000002 r7:60000013 r6:ed439d8c r5:85b72400 r4:85b72400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b72400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed439e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b72400 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed26f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba0f8c r4:85ba0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba0f8c r4:851ba780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b72400 r8:851ba7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ba780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ba780 r8:80287e08 r7:ed435e60 r6:851ba800 r5:85b72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed439fb0 to 0xed439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a5a80 INFO: task kworker/1:589:6825 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d8714000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 INFO: task kworker/1:590:6827 blocked for more than 477 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b73000 r8:851ba8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:6829 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:6829 tgid:6829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed441d84 r8:00000002 r7:60000113 r6:ed441d8c r5:85b73c00 r4:85b73c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b73c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed441e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85925280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3fd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed45d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba238c r4:85ba2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba238c r4:851ba980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b73c00 r8:851ba9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ba980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ba980 r8:80287e08 r7:ed43de60 r6:851baa00 r5:85b73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed441fb0 to 0xed441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a5d40 INFO: task kworker/1:591:6829 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d8b13000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:85b74800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85ba1b8c r4:85ba1800 r10:61c88647 r9:85b74800 r8:851baaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed449fb0 to 0xed449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a0d40 INFO: task kworker/1:592:6830 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d8ed3000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:593 state:D stack:0 pid:6833 tgid:6833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed455d84 r8:00000002 r7:60000013 r6:ed455d8c r5:85b75400 r4:85b75400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b75400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed455e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85925140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b75400 r7:00000000 r6:83018200 r5:00001000 r4:7f3fb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed451000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba1f8c r4:85ba1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b75400 r8:851babac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85b76000 r8:851bacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:595 state:D stack:0 pid:6837 tgid:6837 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859255c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f401000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed475000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba2b8c r4:85ba2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba2b8c r4:851bad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b76c00 r8:851badac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bad80 r8:80287e08 r7:ed461e60 r6:851bae00 r5:85b76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed46dfb0 to 0xed46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85925340 INFO: task kworker/1:595:6837 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d95e4000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:596 state:D stack:0 pid:6839 tgid:6839 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed479e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b78000 r8:851baeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85b78c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b78c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed485e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85925c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f40b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba378c r4:85ba3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba378c r4:851baf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b78c00 r8:851bafac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851baf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851baf80 r8:80287e08 r7:ed479e60 r6:8591e000 r5:85b78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed485fb0 to 0xed485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859256c0 INFO: task kworker/1:597:6841 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d9ba8000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f409000 r7:ddde2d80 r6:83018200 r5:85ba338c r4:8591e080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: d9ba8000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:6847 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:6847 tgid:6847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4bdd84 r8:00000002 r7:60000113 r6:ed4bdd8c r5:85b7bc00 r4:85b7bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b7bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85925f00 r4:00000000 r9:83018205 r8:85b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f40f000 r7:ddde2d80 r6:83018200 r5:85ba3b8c r4:8591e180 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85b7b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f417000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb0b8c r4:85bb0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb0b8c r4:8591e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b7b000 r8:8591e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591e280 r8:80287e08 r7:ed4bde60 r6:8591e300 r5:85b7b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4d5fb0 to 0xed4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85925c80 INFO: task kworker/1:600:6850 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:6851 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:6851 tgid:6851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4d9d84 r8:00000002 r7:60000113 r6:ed4d9d8c r5:85b79800 r4:85b79800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b79800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d140 r5:00001000 r4:ed4d1000 r5:85ba3f8c r4:85ba3c00 r10:61c88647 r9:85b79800 r8:8591e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:6854 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:6854 tgid:6854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4edd84 r8:00000002 r7:60000113 r6:ed4edd8c r5:85b7d400 r4:85b7d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b7d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f413000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb038c r4:85bb0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb038c r4:8591e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b7d400 r8:8591e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591e480 r8:80287e08 r7:ed4d5e60 r6:8591e500 r5:85b7d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4edfb0 to 0xed4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4f9e08 r5:00001000 r4:ed4e9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:dfa0ddc0 r5:00001000 r4:e0053000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:604:6858 blocked for more than 478 seconds. r5:85b80000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed505e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b80000 r7:00000000 r6:83018200 r5:00001000 r4:7f419000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed501000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb0f8c r4:85bb0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb0f8c r4:8591e680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b80000 r8:8591e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591e680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591e680 r8:80287e08 r7:ed4d5e60 r6:8591e700 r5:85b80000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed505fb0 to 0xed505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592d580 INFO: task kworker/1:604:6858 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: dad8b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:6862 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:6862 tgid:6862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4c9d84 r8:00000002 r7:60000113 r6:ed4c9d8c r5:85b80c00 r4:85b80c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b80c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f41b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed50d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb138c r4:85bb1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb138c r4:8591e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b80c00 r8:8591e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591e780 r8:80287e08 r7:ed505e60 r6:8591e800 r5:85b80c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4c9fb0 to 0xed4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b81800 r7:00000000 r6:83018200 r5:00001000 r4:7f423000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:6864 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:6864 tgid:6864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed499d84 r8:00000002 r7:60000013 r6:ed499d8c r5:85b82400 r4:85b82400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b82400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed499e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592db40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b82400 r7:00000000 r6:83018200 r5:00001000 r4:7f41d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed515000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb178c r4:85bb1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb178c r4:8591e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b82400 r8:8591e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591e980 r8:80287e08 r7:ed4a5e60 r6:8591ea00 r5:85b82400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed499fb0 to 0xed499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592dc00 INFO: task kworker/1:607:6864 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85b83000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed521e08 r5:85bb1b8c r4:85bb1800 r10:61c88647 r9:85b83000 r8:8591eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b83c00 r8:8591ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed52dfb0 to 0xed52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592de00 INFO: task kworker/1:609:6868 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: dba85000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:6871 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:6871 tgid:6871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85b84800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b84800 r7:00000000 r6:83018200 r5:00001000 r4:7f425000 r5:85bb278c r4:85bb2400 r10:61c88647 r9:85b84800 r8:8591ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85b85400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed545e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8591ed80 r8:80287e08 r7:ed539e60 r6:8591ee00 r5:85b85400 INFO: task kworker/1:611:6872 is blocked on a mutex likely owned by task kworker/1:7:3126. dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:6875 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:6875 tgid:6875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed551d84 r8:00000002 r7:60000113 r6:ed551d8c r5:85b86000 r4:85b86000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b86000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed551e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590db40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b86000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb8f8c r4:85bb8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb8f8c r4:8591ee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b86000 r8:8591eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591ee80 r8:80287e08 r7:ed545e60 r6:8591ef00 r5:85b86000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b86c00 r8:8591efac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:6879 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:6879 tgid:6879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1e9d84 r8:00000002 r7:60000113 r6:ed1e9d8c r5:85b7e000 r4:85b7e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b7e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85917d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f377000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb378c r4:85bb3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb378c r4:85912080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b7e000 r8:859120ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85912080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85912080 r8:80287e08 r7:ed55de60 r6:85912100 r5:85b7e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e9fb0 to 0xed1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed091000 r7:ddde2d80 r6:83018200 r5:85bb3f8c r4:85912180 r10:00000000 r9:85912180 r8:80287e08 r7:ed1e9e60 r6:85912200 r5:85b88c00 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:6887 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:6887 tgid:6887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed175d84 r8:00000002 r7:60000113 r6:ed175d8c r5:85b88000 r4:85b88000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b88000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85917e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b88000 r7:00000000 r6:83018200 r5:00001000 r4:7f385000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb3b8c r4:85bb3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb3b8c r4:85912280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b88000 r8:859122ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85912280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85912280 r8:80287e08 r7:ed321e60 r6:85912300 r5:85b88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed175fb0 to 0xed175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85917b80 INFO: task kworker/1:616:6887 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: dd26a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 r4:00000000 r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85b8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f389000 r7:ddde2d80 r6:83018200 r5:85bb838c r4:85912380 r10:00000000 r9:85912380 r8:80287e08 r7:ed321e60 r6:85912400 r5:85b8a400 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed35de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590dd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f3a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb978c r4:85bb9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb978c r4:85912480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b8b000 r8:859124ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85912480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85912480 r8:80287e08 r7:ed569e60 r6:85912500 r5:85b8b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed35dfb0 to 0xed35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85917f00 INFO: task kworker/1:618:6897 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: dd26a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b8bc00 r8:859125ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r4:dfa0ddc0 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:6901 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:6901 tgid:6901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed369d84 r8:00000002 r7:60000113 r6:ed369d8c r5:85b8c800 r4:85b8c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b8c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed369e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590d280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f38f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed239000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb8b8c r4:85bb8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb8b8c r4:85912680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b8c800 r8:859126ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85912680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85912680 r8:80287e08 r7:ed35de60 r6:85912700 r5:85b8c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed369fb0 to 0xed369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8590d100 INFO: task kworker/1:620:6901 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: dd7b1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed38de08 r5:00001000 r4:eb695000 r7:ddde2d80 r6:83018200 r5:85bb938c r4:85912780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:622:6916 blocked for more than 478 seconds. r5:85b89800 r4:8291a680 r4:00000000 r9:83018205 r8:85b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f3a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec659000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb9b8c r4:85bb9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb9b8c r4:85912880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b89800 r8:859128ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85912880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85912880 r8:80287e08 r7:ed35de60 r6:85912900 r5:85b89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed381fb0 to 0xed381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8590ddc0 INFO: task kworker/1:622:6916 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ddc9d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:623:6919 blocked for more than 478 seconds. r4:85b8ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed375e08 r4:00000000 r5:85bb9f8c r4:85bb9c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed571e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b8d400 r8:85912aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ddc9d000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:6922 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:6922 tgid:6922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed581d84 r8:00000002 r7:60000013 r6:ed581d8c r5:85b7c800 r4:85b7c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b7c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed581e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85917280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f3af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bba78c r4:85bba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bba78c r4:85912b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b7c800 r8:85912bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:85b98000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592de40 r5:85bbab8c r4:85bba800 r10:61c88647 r9:85b98000 r8:85912cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: de8c3000 eb0cd000 00000001 80239b98 7f13f000 00000001 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:627:6926 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:6926 tgid:6926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed58dd84 r8:00000002 r7:60000113 r6:ed58dd8c r5:85b98c00 r4:85b98c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b98c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed58de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859150c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbaf8c r4:85bbac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbaf8c r4:85912d80 r10:61c88647 r9:85b98c00 r8:85912dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:628:6928 blocked for more than 478 seconds. r4:85b99800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915300 r7:ddde2d80 r6:83018200 r5:85bbb38c r4:85912e80 r10:61c88647 r9:85b99800 r8:85912eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85912e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85912e80 r8:80287e08 r7:ed58de60 r6:85912f00 r5:85b99800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed591fb0 to 0xed591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915240 INFO: task kworker/1:628:6928 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: dee9b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:629:6930 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:629 state:D stack:0 pid:6930 tgid:6930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85b9a400 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85bbb78c r4:85bbb400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859153c0 INFO: task kworker/1:629:6930 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: df2b0000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:630:6932 blocked for more than 478 seconds. r5:85b9b000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85bbbb8c r4:85bbb800 r7:ddde2d80 r6:83018200 r5:85bbbb8c r4:85852080 r10:61c88647 r9:85b9b000 r8:858520ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: df2b0000 eb0cd000 00000001 80239b98 7f13f000 00000001 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed59dfb0 to 0xed59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859154c0 INFO: task kworker/1:631:6934 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: df7db000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:632:6937 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:632 state:D stack:0 pid:6937 tgid:6937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5a1d84 r8:00000002 r7:60000113 r6:ed5a1d8c r5:85b9c800 r4:85b9c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85b9c800 r8:858522ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: df899000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:6938 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:6938 tgid:6938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5a5d84 r8:00000002 r7:60000113 r6:ed5a5d8c r5:85b9d400 r4:85b9d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc438c r4:85bc4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc438c r4:85852380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b9d400 r8:858523ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85852380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85852380 r8:80287e08 r7:ed5a1e60 r6:85852400 r5:85b9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5a5fb0 to 0xed5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859157c0 INFO: task kworker/1:633:6938 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:634:6940 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred r4:85b9e000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85b9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f3d9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85852480 r8:80287e08 r7:ed5a5e60 r6:85852500 r5:85b9e000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc478c r4:85bc4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc478c r4:85852580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b9ec00 r8:858525ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85852580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85852580 r8:80287e08 r7:ed5a9e60 r6:85852600 r5:85b9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5adfb0 to 0xed5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915bc0 INFO: task kworker/1:635:6942 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e00b1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:636:6944 blocked for more than 478 seconds. r5:85b90000 r4:8291a680 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85b90000 r7:00000000 r6:83018200 r5:00001000 r4:7f3c9000 r5:85bc4b8c r4:85bc4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b90000 r8:858526ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85852680 r8:80287e08 r7:ed5a9e60 r6:85852700 r5:85b90000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: e049c000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85b91800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b91800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed585e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc4f8c r4:85bc4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc4f8c r4:85852780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b91800 r8:858527ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85852780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85852780 r8:80287e08 r7:ed5a9e60 r6:85852800 r5:85b91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed585fb0 to 0xed585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915d40 INFO: task kworker/1:637:6946 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e0871000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:6949 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:6949 tgid:6949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5c1d84 r8:00000002 r7:60000113 r6:ed5c1d8c r5:85b90c00 r4:85b90c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b90c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85082540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3db000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed487000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc578c r4:85bc5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:8291a684 r9:ed5c5d84 r8:00000002 r7:60000013 r6:ed5c5d8c r5:85b93c00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85852980 5fa0: 00000000 00000000 00000000 00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r5:84af7b8c r4:84af7800 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b92400 r8:85852aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85852a80 r8:80287e08 r7:ed5c5e60 r6:85852b00 r5:85b92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b5fb0 to 0xed5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85082500 INFO: task kworker/1:640:6955 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e0eb9000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:6957 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:6957 tgid:6957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5b9d84 r8:00000002 r7:60000113 r6:ed5b9d8c r5:85b94800 r4:85b94800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b94800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85082ac0 r5:85bc678c r4:85bc6400 r10:61c88647 r9:85b94800 r8:85852bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: e0eb9000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:85b95400 r4:8291a680 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85082980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b95400 r7:00000000 r6:83018200 r5:00001000 r4:7f3e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc638c r4:85bc6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc638c r4:85852c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b95400 r8:85852cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85852c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85852c80 r8:80287e08 r7:ed5b9e60 r6:85852d00 r5:85b95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5c9fb0 to 0xed5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84867140 r5:85b96000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85bc6b8c r4:85bc6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: e1272000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 r5:00001000 r4:e0053000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:644:6963 blocked for more than 478 seconds. r5:85b93000 r4:8291a680 r4:00000000 r4:00000000 r5:85bc6f8c r4:85bc6c00 r10:61c88647 r9:85b93000 r8:85852eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85082cc0 INFO: task kworker/1:644:6963 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e16a7000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:6965 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:6965 tgid:6965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5d9d84 r8:00000002 r7:60000113 r6:ed5d9d8c r5:85c18000 r4:85c18000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c18000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85082000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c18000 r7:00000000 r6:83018200 r5:00001000 r4:7f3e9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc738c r4:85bc7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c18000 r8:85852fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85c19800 r8:850910ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:84af7b8c r4:84af7800 r4:84864380 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:6969 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:6969 tgid:6969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5d5d84 r8:00000002 r7:60000013 r6:ed5d5d8c r5:85c1a400 r4:85c1a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c1a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f3eb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc778c r4:85bc7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc778c r4:85091180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1a400 r8:850911ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091180 r8:80287e08 r7:ed5dde60 r6:85091200 r5:85c1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5d5fb0 to 0xed5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508a080 INFO: task kworker/1:647:6969 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a400 r5:85bc7b8c r4:85bc7800 r10:61c88647 r9:85c1b000 r8:850912ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: e1eec000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c1bc00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed527000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd438c r4:85bd4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bd438c r4:85091380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1bc00 r8:850913ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091380 r8:80287e08 r7:ed5dde60 r6:85091400 r5:85c1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5e1fb0 to 0xed5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508a2c0 INFO: task kworker/1:649:6973 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e22a6000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 r4:84867140 r4:85c1c800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:85091480 r8:80287e08 r7:ed5e1e60 r6:85091500 r5:85c1c800 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ed5f1d84 r8:00000002 r7:60000113 r6:ed5f1d8c r5:85c1d400 r4:00000000 r9:83018205 r8:85c1d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 r5:00001000 r4:ed53b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd478c r4:85bd4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bd478c r4:85091580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1d400 r8:850915ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091580 r8:80287e08 r7:ed5ede60 r6:85091600 r5:85c1d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5f1fb0 to 0xed5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508a680 INFO: task kworker/1:651:6977 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e2598000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5f5e08 r9:83018205 r8:85c1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: e29be000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c1ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5e9e08 r9:83018205 r8:85c1ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3f7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed557000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd4f8c r4:85bd4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bd4f8c r4:85091780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1ec00 r8:850917ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091780 r8:80287e08 r7:ed5f5e60 r6:85091800 r5:85c1ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5e9fb0 to 0xed5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508a780 INFO: task kworker/1:653:6980 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e29be000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:654:6983 blocked for more than 478 seconds. r5:85c18c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85bd5b8c r4:85bd5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: e2d54000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:6985 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:6985 tgid:6985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed609d84 r8:00000002 r7:60000113 r6:ed609d8c r5:85b96c00 r4:85b96c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b96c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed609e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ae00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd578c r4:85bd5400 r7:ddde2d80 r6:83018200 r5:85bd578c r4:85091980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: dd20: e2d54000 eb0cd000 00000001 80239b98 7f13f000 00000001 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85a90c00 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85082fc0 r10:61c88647 r9:85a90c00 r8:85091aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 r4:dfa0ddc0 r4:84864380 r4:84867140 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed619e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508d540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f38d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd6b8c r4:85bd6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bd6b8c r4:85091b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a96c00 r8:85091b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091b00 r8:80287e08 r7:ed611e60 r6:859f6500 r5:85a96c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed619fb0 to 0xed619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508d080 INFO: task kworker/1:657:6989 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e37a4000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a90000 r8:85091bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:84867140 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed625e08 r5:00001000 r4:ecbff000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:6994 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:6994 tgid:6994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed629d84 r8:00000002 r7:60000113 r6:ed629d8c r5:85a93c00 r4:85a93c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a93c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed629e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508d600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f38f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecda5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd6f8c r4:85bd6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bd6f8c r4:85091c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a93c00 r8:85091cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091c80 r8:80287e08 r7:ed619e60 r6:859f6680 r5:85a93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed629fb0 to 0xed629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508d8c0 r10:00000000 r9:85091d00 r8:80287e08 r7:ed629e60 r6:859f6700 r5:857d0000 INFO: task kworker/1:661:6998 is blocked on a mutex likely owned by task kworker/1:7:3126. dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85bd738c r4:85bd7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bd738c r4:85091d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d0c00 r8:85091dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091d80 r8:80287e08 r7:ed631e60 r6:859f6780 r5:857d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed635fb0 to 0xed635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508d480 INFO: task kworker/1:662:6999 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e419a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:dfa0ddc0 r4:84864380 r4:84867140 r5:857d1800 r4:8291a680 r5:00001000 r4:ece31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd7b8c r4:85bd7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bd7b8c r4:85091e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d1800 r8:85091eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85091e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85091e80 r8:80287e08 r7:ed63de60 r6:859f6880 r5:857d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed645fb0 to 0xed645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508d740 INFO: task kworker/1:664:7003 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e4687000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:ddde2d80 r6:83018200 r5:85bd7f8c r4:85091f00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dfa0ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:7007 tgid:7007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed655d84 r8:00000002 r7:60000113 r6:ed655d8c r5:857d5400 r4:857d5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed655e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ddc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f409000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed209000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1478c r4:85c14400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1478c r4:85091f80 r4:85091f80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: e48e2000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:7010 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:7010 tgid:7010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed65dd84 r8:00000002 r7:60000113 r6:ed65dd8c r5:857d3c00 r4:857d3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed65de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508df40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f40b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed251000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:857d3c00 r8:8581302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:857d6c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e300 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c15b8c r4:85c15800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c15b8c r4:85813080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d6c00 r8:858130ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813080 r8:80287e08 r7:ed63de60 r6:859f6a80 r5:857d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed665fb0 to 0xed665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508dd40 INFO: task kworker/1:668:7012 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e4d11000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed34d000 r7:ddde2d80 r6:83018200 r5:85c1538c r4:85813100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: e4d11000 eb0cd000 00000001 80239b98 7f13f000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:7015 tgid:7015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed671d84 r8:00000002 r7:60000113 r6:ed671d8c r5:857d6000 r4:857d6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed671e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f417000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1578c r4:85c15400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1578c r4:85813180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d6000 r8:858131ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813180 r8:80287e08 r7:ed665e60 r6:859f6b80 r5:857d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed671fb0 to 0xed671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508d980 INFO: task kworker/1:670:7015 is blocked on a mutex likely owned by task kworker/1:7:3126. r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed61de08 r7:ddde2d80 r6:83018200 r5:85c15f8c r4:85813200 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84867140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85c1638c r4:85813280 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e572b000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:7025 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:7025 tgid:7025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed689d84 r8:00000002 r7:60000013 r6:ed689d8c r5:85030c00 r4:85030c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85030c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed689e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85030c00 r7:00000000 r6:83018200 r5:00001000 r4:7f41f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed68b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85030c00 r8:8581332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: r5:800f0013 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84867140 r4:85031800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e980 r10:61c88647 r9:85031800 r8:858133ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:675:7029 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:675 state:D stack:0 pid:7029 tgid:7029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed675d84 r8:00000002 r7:60000013 r6:ed675d8c r5:85c21800 r4:85c21800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c21800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed675e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c21800 r7:00000000 r6:83018200 r5:00001000 r4:7f421000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed693000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c16b8c r4:85c16800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c16b8c r4:85813400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c21800 r8:8581342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813400 r8:80287e08 r7:ed69de60 r6:85813480 r5:85c21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed675fb0 to 0xed675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580e600 INFO: task kworker/1:675:7029 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 Exception stack(0xdfa0dd28 to 0xdfa0dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r5:00001000 r4:e0053000 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:676:7031 blocked for more than 479 seconds. r5:85033000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85813500 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:7032 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:7032 tgid:7032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed6b1d84 r8:00000002 r7:60000113 r6:ed6b1d8c r5:85033c00 r4:85033c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85033c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ebc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85033c00 r7:00000000 r6:83018200 r5:00001000 r4:7f427000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1778c r4:85c17400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1778c r4:85813580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85033c00 r8:858135ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813580 r8:80287e08 r7:ed6ade60 r6:859f6e80 r5:85033c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b1fb0 to 0xed6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580e600 INFO: task kworker/1:677:7032 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e5e14000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:dfa0ddc0 r5:00001000 r4:e0053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84867140 task:kworker/1:678 state:D stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85813600 r8:80287e08 r7:ed6b1e60 r6:859f6f00 r5:85034800 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e6278000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:7037 blocked for more than 479 seconds. r10:8291a684 r9:ed6e5d84 r8:00000002 r7:60000113 r6:ed6e5d8c r5:85035400 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85813680 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ed80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85813780 r8:80287e08 r7:ed6e5e60 r6:84bf5000 r5:85036000 r4:8580edc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e69ad000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:7040 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:7040 tgid:7040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c5038c r4:85813700 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5078c r4:85c50400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5078c r4:85813800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e8c00 r8:8581382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813800 r8:80287e08 r7:ed6e5e60 r6:84bf5100 r5:857e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed709fb0 to 0xed709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ec40 INFO: task kworker/1:682:7042 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e69ad000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:7044 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:7044 tgid:7044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed719d84 r8:00000002 r7:60000113 r6:ed719d8c r5:857e8000 r4:857e8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed719e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f431000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed70f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c50b8c r4:85c50800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c50b8c r4:85813880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85813880 r8:80287e08 r7:ed6e5e60 r6:84bf5180 r5:857e8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Not tainted 6.15.0-rc7-syzkaller #0 r4:857e9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed721e08 r5:00001000 r4:dfc6d000 r5:85c5138c r4:85c51000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5138c r4:85813900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e9800 r8:8581392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813900 r8:80287e08 r7:ed6e5e60 r6:84bf5200 r5:857e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed721fb0 to 0xed721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85042080 INFO: task kworker/1:684:7046 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e6cb1000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:857eb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6a9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:686:7053 blocked for more than 479 seconds. r10:8291a684 r9:ed605d84 r8:00000002 r7:60000013 r6:ed605d8c r5:857ea400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed605e08 r5:00001000 r4:ece81000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85813a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813a00 r8:80287e08 r7:ed6a9e60 r6:84bf5300 r5:857ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed605fb0 to 0xed605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85042340 INFO: task kworker/1:686:7053 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e761a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:7055 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:7055 tgid:7055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed6bdd84 r8:00000002 r7:60000113 r6:ed6bdd8c r5:857ec800 r4:857ec800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ec800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6bde08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) r4:84867140 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85c23000 r8:85813b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e761a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:7114 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:7114 tgid:7114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed765d84 r8:00000002 r7:60000013 r6:ed765d8c r5:85c25400 r4:85c25400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c25400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed765e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850902c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:850902c0 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85813d00 r8:80287e08 r7:ed605e60 r6:85813d80 r5:85c23c00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:691:7119 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:691 state:D stack:0 pid:7119 tgid:7119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed73dd84 r8:00000002 r7:60000113 r6:ed73dd8c r5:85c20000 r4:85c20000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c20000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed73de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c20000 r7:00000000 r6:83018200 r5:00001000 r4:7f42b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecef1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c52f8c r4:85c52c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c52f8c r4:85813e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c20000 r8:85813e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813e00 r8:80287e08 r7:ed605e60 r6:85813e80 r5:85c20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed73dfb0 to 0xed73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850903c0 INFO: task kworker/1:691:7119 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: e7ced000 eb0cd000 00000001 80239b98 7f13f000 00000001 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:7121 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:7121 tgid:7121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed775d84 r8:00000002 r7:60000013 r6:ed775d8c r5:85c24800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed775e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c24800 r7:00000000 r6:83018200 r5:00001000 r4:7f42d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5338c r4:85c53000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5338c r4:85813f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c24800 r8:85813f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85813f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85813f00 r8:80287e08 r7:ed73de60 r6:85813f80 r5:85c24800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed779e08 r5:00001000 r4:ecfd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5378c r4:85c53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5378c r4:850b2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c22400 r8:850b202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2000 r8:80287e08 r7:ed775e60 r6:850b2080 r5:85c22400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed779fb0 to 0xed779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85090900 INFO: task kworker/1:693:7123 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e8175000 eb0cd000 00000001 80239b98 7f13f000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e8c50000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:7127 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:7127 tgid:7127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed755d84 r8:00000002 r7:60000013 r6:ed755d8c r5:8551bc00 r4:8551bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed755e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c53b8c r4:850b2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551bc00 r8:850b222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2200 r8:80287e08 r7:ed77de60 r6:850b2280 r5:8551bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed755fb0 to 0xed755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85090d80 INFO: task kworker/1:695:7127 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e8c50000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850b2300 Exception stack(0xed76dfb0 to 0xed76dff8) task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:697:7133 blocked for more than 479 seconds. r10:8291a684 r9:ed771d84 r8:00000002 r7:60000113 r6:ed771d8c r5:857ee000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ecddd000 r7:ddde2d80 r6:83018200 r5:84a7eb8c r4:850b2400 r4:00000001 r4:850423c0 Call trace: r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e8fd7000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:7136 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:7136 tgid:7136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed78dd84 r8:00000002 r7:60000013 r6:ed78dd8c r5:857eec00 r4:857eec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857eec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed78de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f43f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5c38c r4:85c5c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5c38c r4:850b2480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857eec00 r8:850b24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 r5:00001000 r4:e0053000 r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:699 state:D stack:0 pid:7138 tgid:7138 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed795e08 r5:00001000 r4:ed221000 r5:85c5c78c r4:85c5c400 r10:61c88647 r9:85036c00 r8:850b252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2500 r8:80287e08 r7:ed78de60 r6:84bf5500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed795fb0 to 0xed795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508f300 INFO: task kworker/1:699:7138 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e9248000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed2f3000 r5:85c5cb8c r4:85c5c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ebc00 r8:850b25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2580 r8:80287e08 r7:ed795e60 r6:84bf5580 r5:857ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed799fb0 to 0xed799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508f300 INFO: task kworker/1:700:7139 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e959c000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed365000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850b2600 r8:80287e08 r7:ed799e60 r6:84bf5600 r5:85c88c00 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:702 state:D stack:0 pid:7143 tgid:7143 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c88000 r7:00000000 r6:83018200 r5:00001000 r4:7f445000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed307000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5cf8c r4:85c5cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5cf8c r4:850b2680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c88000 r8:850b26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2680 r8:80287e08 r7:ed7a1e60 r6:84bf5680 r5:85c88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7a9fb0 to 0xed7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508f700 INFO: task kworker/1:702:7143 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e9c7a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:858c8c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed4b7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: e9c7a000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:7148 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:7148 tgid:7148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7add84 r8:00000002 r7:60000013 r6:ed7add8c r5:858ca400 r4:858ca400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ca400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f449000 r5:00001000 r4:ed3bb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850b2800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84867140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:7149 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:7149 tgid:7149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7b1d84 r8:00000002 r7:60000013 r6:ed7b1d8c r5:858cb000 r4:858cb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858cb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c5db8c r4:850b2900 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r5:84af7b8c r4:84af7800 r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f455000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5e38c r4:85c5e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5e38c r4:850b2a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858cd400 r8:850b2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2a00 r8:80287e08 r7:ed785e60 r6:850b2a80 r5:858cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7bdfb0 to 0xed7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508fbc0 INFO: task kworker/1:706:7152 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ea795000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 r4:00000001 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:858cbc00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5e78c r4:85c5e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5e78c r4:850b2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858cbc00 r8:850b2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2b00 r8:80287e08 r7:ed7bde60 r6:850b2b80 r5:858cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7c1fb0 to 0xed7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85071080 INFO: task kworker/1:707:7158 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ea795000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7b8c r4:84864380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f0000 r8:848643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84864380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ed745d84 r8:00000002 r7:60000013 r6:ed745d8c r5:858ce000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858ce000 r8:850b2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: ea795000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84864380 r8:80287e08 r7:df9e9e60 r6:84836a00 r5:841f0000 dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:858cc800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed53d000 r5:85c5ef8c r4:85c5ec00 r10:61c88647 r9:858cc800 r8:850b2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:dfa0ddc0 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:710:7164 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:7164 tgid:7164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7cdd84 r8:00000002 r7:60000113 r6:ed7cdd8c r5:858c9800 r4:858c9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858c9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850715c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f45f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed55f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0478c r4:85c04400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0478c r4:850b2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c9800 r8:850b2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2e00 r8:80287e08 r7:ed7b5e60 r6:850b2e80 r5:858c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7cdfb0 to 0xed7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85071400 INFO: task kworker/1:710:7164 is blocked on a mutex likely owned by task kworker/1:7:3126. task:kworker/1:7 state:R running task stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:841f0000 r8:80200be4 r7:dfa0dd5c r6:ffffffff r5:841f0000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfa0dd28 to 0xdfa0dd70) dd20: eac74000 eb0cd000 00000001 80239b98 7f13f000 00000001 dd40: 82ac15a0 7f13f000 eb0cd000 8280c928 82ac21c4 dfa0dda4 dfa0dda8 dfa0dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa0ddc0 r5:dfa0de08 r4:dfa0ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84864380 Exception stack(0xdfa0dfb0 to 0xdfa0dff8) INFO: task kworker/1:711:7166 blocked for more than 479 seconds. r5:85c26c00 r4:8291a680 r4:00000000 r9:83018205 r8:85c26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 r10:61c88647 r9:85c26c00 r8:850b2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b2f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b2f00 r8:80287e08 r7:ed7cde60 r6:850b2f80 r5:85c26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d1fb0 to 0xed7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000